SlideShare una empresa de Scribd logo
1 de 24
<ALISDAIR RITCHIE>
PETRAS – National IoT Research Hub
University of Warwick
Research:TheAnswerto the Problem of IoT Security
Research: The Answer to the Problem
of IoT Security.
Dr Alisdair Ritchie – PETRAS Impact Champion.
WMG, University of Warwick.
Setting the Scene
• Cyber attacks cost businesses as much as $400 billion a year
(Lloyds London)
• 99.9% of exploited vulnerabilities were compromised more
than a year after the vulnerability was published (Verizon
2017 Data Breach Investigations Report)
• Devices – 20.4 billion connected devices in use by 2020 up
from 8.4 billion in 2017 (Gartner)
• Internet of Things – In 2017, spend on IoT hardware was
$2.09 billion (Gartner)
3
The Internet of Things (IoT)
• Smart technologies make previously unintelligent things (like
home thermostats, white goods, or building management
systems) able to compute and communicate – typically
wirelessly
• Almost all the data that IoT devices send is to other
machines – there are no humans involved: ‘M2M’
communications
• Generic chipsets can be used to provide specific functionality
without consideration for the rest of the functions
• Security can cost more to research and implement than to
make the devices themselves
Applications of IoT – diverse and pervasive
• Households
– Smart thermostats
– White goods
– Televisions
• Building Management Systems (BMS) – sensors and controls
– Heating, ventilation & air conditioning
– Access controls
• Industrial and Utilities control systems
– Sensors and actuators (pumps, heaters, valves, etc.)
• Medical and Hospital equipment
– Patient monitors
– Patient information recording
• Transport
– Condition monitoring
– Asset location
• Retail
The Future Digital World
• Big Data - 90% of all the data in the world has been
created in the last two years (SINTEF ICT)
• The Robot “Birth Rate” is doubling every five years
(International Federation of Robotics)
• AI could add an additional £630bn to the UK Economy by
2035 (Government AI Report – Dame Wendy Hall)
• Regulations to govern these functions don’t exist yet and
research is required to generate this knowledge
What are the Issues that need to be
tackled?
Some examples of threats
• Contactless card skimming
• Hacking Building Management Systems
• Baby monitors
• Smart TVs
• USB devices
• Smart domestic goods
• Smart toys
• Cars, now and in the future
• Healthcare device
– From Fitbit to infusion pumps
Smart Toys
Increasingly, toys are equipped with internet
communications, cameras, geolocation, etc.
• Risk of digital stalking and peeping
(geolocation with picture data)
• Robots, dolls, drones
• Threat not yet fully emergent, but risk is
perceived
• PETRAS project at Lancaster called IoT4Kids
seeks to understand the security and privacy
implications for children using the IoT
See: http://www.cnet.com/news/hello-headaches-barbie-of-the-internet-age-has-even-
more-security-flaws/
The Value of Personal Data
Bagram US Air Base in Afghanistan as lit up by Strava
Source: BBC
Positive for the Future
• Productivity – Research could see machines double their
outputs every four years through rapid decision making and
environmental learning
• Retail and Logistics - Faster / more accurate order delivery on
demand
• Healthcare – Simple devices could provide solutions that
enable elderly people to stay in their homes – NHS Dementia
Test Bed
What is the UK doing about it?
PETRAS – key facts
Projects grouped by type into
‘Constellations’, sample one or
more of the Stream threads
• 11 world leading universities
• Combined hub value: £23m
• More than 50 projects
launched since 2016
• Blackett Review expertise
• 47 partners at submission,
60+ added since, combining
presence in the UK, Central
Europe and America
(giving International links
and perspective)
• Inter– and multi-disciplinary
focus split between social and
technical knowledge spheres
P
E
T
R
A
S
Privacy
Ethics
Trust
Reliability
Acceptability
Security
Social
Technical
Social and physical science challenges
16
Aims
• Deliver real co-produced cross-sectoral, impactful, and
timely technical and socioeconomic benefit;
• Place the UK as world-leader in expertise and deployment
of trusted IoT technology;
• Create a cross-disciplinary environment across research
domains, industries, and government departments;
• Create a social platform for innovation and co-creation
with users and stakeholders;
• Provide an enduring legacy from the PETRAS Hub, beyond
the end of the funded period.
To:
Research into IoT Systems
PETRAS Demonstrators
• IoT in the Home (BRE)
• IoT in Critical National Infrastructure (Airbus /
Costain)
• Data Sharing in the IoT (Cisco)
• IoT in Smart Buildings (Newcastle and Cube Controls)
• Moving in the IoT (Meridian / Costain / JLR)
• Art Connect (Tate)
Around £1m invested, including match funding
‘Safe Deployment of Knowledge in use’
IoT in the Home
The context of the demonstrator project is
BRE’s Innovation Park, which includes
more than 8 domestic buildings, 3 of which
have integrated photovoltaic power
generation (PV) with battery storage and
network import/export management.
Deliverables:
• Real full-scale ‘Smart Home’
• Smart Home simulator
• Use case – Micro energy-
trading in a community
• Report on factors influencing
adoption & acceptability
• Guidelines for secure IoT
deployment
Impact:
• Design, procurement,
deployment and operation
• Government and Industry
policy advice
Art Connect - Tate
• Identify pieces, ensure
provenance
• Monitor location and
movement, temperature
and pressure
• Observe condition across
borders in a seamless,
secure, and cost-effective
way
Protecting the
irreplaceable!
What is the Challenge?
• Increase knowledge of the need for cybersecurity
to address the drive to the cheapest solution
• Provide common knowledge base that allow
government and industry to make informed
decisions
• To move some of the onus for research into
issues which affect us all into the public space
• To build communities that can work together on
the problems of the future
Artificial Intelligence
Today’s Issue or the Future’s?
“the people writing the algorithms for software that will control
many automated aspects of our daily lives in the future are
mainly young, white men.”
“Almost by definition, machine learning algorithms will pick up
on any bias in the data they are given to learn from”
Dame Professor Wendy Hall
University of Southampton and PETRAS
writing in “The Conversation”
“If the Burden for Ensuring Security Falls on Consumers
then we have Failed”
Professor Joe Butler, Former Chief Scientist to the Department for Digital, Culture,
Media and Sport
Thank you!
Dr Alisdair Ritchie (a.ritchie@warwick.ac.uk)
PETRAS Impact Champion - WMG, University of Warwick

Más contenido relacionado

La actualidad más candente

Addressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTAddressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTDr.Vetrivelan Pandu
 
PhD Projects in MQTT Research Ideas
PhD Projects in MQTT Research IdeasPhD Projects in MQTT Research Ideas
PhD Projects in MQTT Research IdeasPhD Services
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoTCisco Canada
 
Internet of things
Internet of thingsInternet of things
Internet of thingsSanoj Kumar
 
logistics and the internet of things
logistics and the internet of thingslogistics and the internet of things
logistics and the internet of thingsSergey Zhdanov
 
Arrow Global Village IoT Summit (2016)
Arrow Global Village IoT Summit (2016)Arrow Global Village IoT Summit (2016)
Arrow Global Village IoT Summit (2016)Marc Jadoul
 
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATIONINTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATIONRajat Maheshwari
 
Emerging Technology Trends in the Post-COVID World
Emerging Technology Trends in the Post-COVID WorldEmerging Technology Trends in the Post-COVID World
Emerging Technology Trends in the Post-COVID WorldVincent Lau
 
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaistIot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaistDaeyoung Kim
 
Xively up 2013 v3
Xively up 2013 v3Xively up 2013 v3
Xively up 2013 v3sapenov
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTSemyon Teplisky
 
INTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICSINTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICSCCN
 
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13Rick Holgate
 
Any Time, Anywhere, Any Device (ISASA)
Any Time, Anywhere, Any Device  (ISASA)Any Time, Anywhere, Any Device  (ISASA)
Any Time, Anywhere, Any Device (ISASA)Cathy Oxley
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 

La actualidad más candente (20)

Addressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTAddressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoT
 
The connected utility
The connected utilityThe connected utility
The connected utility
 
PhD Projects in MQTT Research Ideas
PhD Projects in MQTT Research IdeasPhD Projects in MQTT Research Ideas
PhD Projects in MQTT Research Ideas
 
Iot overview
Iot overviewIot overview
Iot overview
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
logistics and the internet of things
logistics and the internet of thingslogistics and the internet of things
logistics and the internet of things
 
Arrow Global Village IoT Summit (2016)
Arrow Global Village IoT Summit (2016)Arrow Global Village IoT Summit (2016)
Arrow Global Village IoT Summit (2016)
 
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATIONINTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
INTERNET OF THINGS - THE NEXT WAVE OF INNOVATION
 
Emerging Technology Trends in the Post-COVID World
Emerging Technology Trends in the Post-COVID WorldEmerging Technology Trends in the Post-COVID World
Emerging Technology Trends in the Post-COVID World
 
IoT13: Xively showcase
IoT13: Xively showcaseIoT13: Xively showcase
IoT13: Xively showcase
 
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaistIot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
 
Xively up 2013 v3
Xively up 2013 v3Xively up 2013 v3
Xively up 2013 v3
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 
INTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICSINTERNET OF THINGS IN LOGISTICS
INTERNET OF THINGS IN LOGISTICS
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13
 
Any Time, Anywhere, Any Device (ISASA)
Any Time, Anywhere, Any Device  (ISASA)Any Time, Anywhere, Any Device  (ISASA)
Any Time, Anywhere, Any Device (ISASA)
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 

Similar a Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security

IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxHadHic
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfImXaib
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalEslam Nader
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptxssuser2cc0d4
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)milemadinah
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Ameer Sameer
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIxonos Plc
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 

Similar a Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security (20)

Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
Blockchain for industry 4.0 HMI 2018
Blockchain for industry 4.0 HMI 2018Blockchain for industry 4.0 HMI 2018
Blockchain for industry 4.0 HMI 2018
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptxThe-Internet-Of-Things-4th-Industrial-Revolution.pptx
The-Internet-Of-Things-4th-Industrial-Revolution.pptx
 
CRMEVOLUTION
CRMEVOLUTIONCRMEVOLUTION
CRMEVOLUTION
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or Everything
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 

Más de Pro Mrkt

NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...Pro Mrkt
 
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be BreakingDavid Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be BreakingPro Mrkt
 
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefenceAlex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefencePro Mrkt
 
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-AttacksNicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-AttacksPro Mrkt
 
Dave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR JourneyDave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR JourneyPro Mrkt
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingPro Mrkt
 
Matthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsMatthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsPro Mrkt
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwarePro Mrkt
 
Grant Thomas - Understanding Hardware Security Threats
Grant Thomas - Understanding Hardware Security ThreatsGrant Thomas - Understanding Hardware Security Threats
Grant Thomas - Understanding Hardware Security ThreatsPro Mrkt
 
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18Pro Mrkt
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldPro Mrkt
 
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldAlex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldPro Mrkt
 
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Pro Mrkt
 
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Pro Mrkt
 

Más de Pro Mrkt (14)

NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
 
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be BreakingDavid Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
 
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefenceAlex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
 
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-AttacksNicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
 
Dave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR JourneyDave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR Journey
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
 
Matthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsMatthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its Impacts
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer Malware
 
Grant Thomas - Understanding Hardware Security Threats
Grant Thomas - Understanding Hardware Security ThreatsGrant Thomas - Understanding Hardware Security Threats
Grant Thomas - Understanding Hardware Security Threats
 
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
 
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldAlex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
 
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
 
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
 

Último

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security

  • 1. <ALISDAIR RITCHIE> PETRAS – National IoT Research Hub University of Warwick Research:TheAnswerto the Problem of IoT Security
  • 2. Research: The Answer to the Problem of IoT Security. Dr Alisdair Ritchie – PETRAS Impact Champion. WMG, University of Warwick.
  • 3. Setting the Scene • Cyber attacks cost businesses as much as $400 billion a year (Lloyds London) • 99.9% of exploited vulnerabilities were compromised more than a year after the vulnerability was published (Verizon 2017 Data Breach Investigations Report) • Devices – 20.4 billion connected devices in use by 2020 up from 8.4 billion in 2017 (Gartner) • Internet of Things – In 2017, spend on IoT hardware was $2.09 billion (Gartner) 3
  • 4. The Internet of Things (IoT) • Smart technologies make previously unintelligent things (like home thermostats, white goods, or building management systems) able to compute and communicate – typically wirelessly • Almost all the data that IoT devices send is to other machines – there are no humans involved: ‘M2M’ communications • Generic chipsets can be used to provide specific functionality without consideration for the rest of the functions • Security can cost more to research and implement than to make the devices themselves
  • 5. Applications of IoT – diverse and pervasive • Households – Smart thermostats – White goods – Televisions • Building Management Systems (BMS) – sensors and controls – Heating, ventilation & air conditioning – Access controls • Industrial and Utilities control systems – Sensors and actuators (pumps, heaters, valves, etc.) • Medical and Hospital equipment – Patient monitors – Patient information recording • Transport – Condition monitoring – Asset location • Retail
  • 6. The Future Digital World • Big Data - 90% of all the data in the world has been created in the last two years (SINTEF ICT) • The Robot “Birth Rate” is doubling every five years (International Federation of Robotics) • AI could add an additional £630bn to the UK Economy by 2035 (Government AI Report – Dame Wendy Hall) • Regulations to govern these functions don’t exist yet and research is required to generate this knowledge
  • 7. What are the Issues that need to be tackled?
  • 8. Some examples of threats • Contactless card skimming • Hacking Building Management Systems • Baby monitors • Smart TVs • USB devices • Smart domestic goods • Smart toys • Cars, now and in the future • Healthcare device – From Fitbit to infusion pumps
  • 9. Smart Toys Increasingly, toys are equipped with internet communications, cameras, geolocation, etc. • Risk of digital stalking and peeping (geolocation with picture data) • Robots, dolls, drones • Threat not yet fully emergent, but risk is perceived • PETRAS project at Lancaster called IoT4Kids seeks to understand the security and privacy implications for children using the IoT See: http://www.cnet.com/news/hello-headaches-barbie-of-the-internet-age-has-even- more-security-flaws/
  • 10. The Value of Personal Data Bagram US Air Base in Afghanistan as lit up by Strava Source: BBC
  • 11. Positive for the Future • Productivity – Research could see machines double their outputs every four years through rapid decision making and environmental learning • Retail and Logistics - Faster / more accurate order delivery on demand • Healthcare – Simple devices could provide solutions that enable elderly people to stay in their homes – NHS Dementia Test Bed
  • 12. What is the UK doing about it?
  • 13. PETRAS – key facts Projects grouped by type into ‘Constellations’, sample one or more of the Stream threads • 11 world leading universities • Combined hub value: £23m • More than 50 projects launched since 2016 • Blackett Review expertise • 47 partners at submission, 60+ added since, combining presence in the UK, Central Europe and America (giving International links and perspective) • Inter– and multi-disciplinary focus split between social and technical knowledge spheres
  • 15. Social and physical science challenges
  • 16. 16 Aims • Deliver real co-produced cross-sectoral, impactful, and timely technical and socioeconomic benefit; • Place the UK as world-leader in expertise and deployment of trusted IoT technology; • Create a cross-disciplinary environment across research domains, industries, and government departments; • Create a social platform for innovation and co-creation with users and stakeholders; • Provide an enduring legacy from the PETRAS Hub, beyond the end of the funded period. To:
  • 17. Research into IoT Systems
  • 18. PETRAS Demonstrators • IoT in the Home (BRE) • IoT in Critical National Infrastructure (Airbus / Costain) • Data Sharing in the IoT (Cisco) • IoT in Smart Buildings (Newcastle and Cube Controls) • Moving in the IoT (Meridian / Costain / JLR) • Art Connect (Tate) Around £1m invested, including match funding ‘Safe Deployment of Knowledge in use’
  • 19. IoT in the Home The context of the demonstrator project is BRE’s Innovation Park, which includes more than 8 domestic buildings, 3 of which have integrated photovoltaic power generation (PV) with battery storage and network import/export management. Deliverables: • Real full-scale ‘Smart Home’ • Smart Home simulator • Use case – Micro energy- trading in a community • Report on factors influencing adoption & acceptability • Guidelines for secure IoT deployment Impact: • Design, procurement, deployment and operation • Government and Industry policy advice
  • 20. Art Connect - Tate • Identify pieces, ensure provenance • Monitor location and movement, temperature and pressure • Observe condition across borders in a seamless, secure, and cost-effective way Protecting the irreplaceable!
  • 21. What is the Challenge? • Increase knowledge of the need for cybersecurity to address the drive to the cheapest solution • Provide common knowledge base that allow government and industry to make informed decisions • To move some of the onus for research into issues which affect us all into the public space • To build communities that can work together on the problems of the future
  • 22. Artificial Intelligence Today’s Issue or the Future’s? “the people writing the algorithms for software that will control many automated aspects of our daily lives in the future are mainly young, white men.” “Almost by definition, machine learning algorithms will pick up on any bias in the data they are given to learn from” Dame Professor Wendy Hall University of Southampton and PETRAS writing in “The Conversation”
  • 23. “If the Burden for Ensuring Security Falls on Consumers then we have Failed” Professor Joe Butler, Former Chief Scientist to the Department for Digital, Culture, Media and Sport
  • 24. Thank you! Dr Alisdair Ritchie (a.ritchie@warwick.ac.uk) PETRAS Impact Champion - WMG, University of Warwick

Notas del editor

  1. Cars, planes, homes, cities, and even animals are being connected. We are putting software everywhere. In today's world, it’s important that technology is available, protected and secure. Interdisciplinary engineering incorporates the knowledge and skills associated with other disciplines. This type of engineering has a broader scope than traditional engineering. Cyber Security is developing into a core subject
  2. Big Data - Look to massive research centres created by internet companies such as Facebook and Google. The rate of expansion for date is increasing IoT devices market in 2017 represents some 8.4 million devices which are worth almost $1.7 trillion. Meanwhile the rapidly growing IoT services market was worth $273bn in 2017. This is a huge market for a technology which has existed for less than 20 years. This market is forecast to expand to more than 20 billion connected devices with a value of $3 trillion by 2020 Robotics – there are around 1,8 million industrial robots in the world today but with the robot birth rate doubling, this is expected to more than 3 million units in 2020
  3. Productivity – As Industry 4.0 and smart factories evolve this will lead to lower costs, greater production capacity, faster and more accurate production with higher quality and reliability where all the robots in a factory are able to learn changes in conditions and evolve processes together. Indeed it has been said that The factory of the future will have only two employees, a man, and a dog.  The man will be there to feed the dog.  The dog will be there to keep the man from touching the equipment. Currently many of these processes sit in manufacturing but as this extends to food production and water management, it could help to offer a solution to what will be one of the big issues of the future – food and water. Retail and Logistics – 3D printing will allow for the production of low volume items on demand whilst the smart inks will impact in tracking and tracing products. This will allow traders to track products at an individual unit level by where they were manufactured, for what market, what level of tax was paid as it crossed borders so that the logistical and quality assurance chain can be determined throughout the life of every product. Healthcare – Perhaps one of the most dramatic changes that connected technologies will ring is to the healthcare industry. Could this be the answer to problem that has become increasingly evidence. People getting older and sicker – Dementia and long term illness whilst traditional killers like heart disease are more preventable Not able to look after themselves and so not able to stay in their own homes – could technology provide the bridge that allows them to remain in home? Devces which can detect people’s location, if they have fallen Used the bathroom more than usual – URT Unusual sleeping, eating or drinking patterns Issues can be followed up by a clinician
  4. So what does PETRAS stand for P E T R A S – it is around this core of cyber security issues that the hub’s research is based. The hub also looks at all of these aspects from both a social and a technical aspect. My own role as Impact Champion is to engage and build partnerships, develop socioeconomic impact in its widest sense and secure a future legacy for the hub beyond its initial three year funded period.
  5. Research into all areas of the cyber security of the internet of things including: Connected and autonomous vehicles – both between vehicles and to their environment and the surrounding infrastructure The smart buildings, homes and factories of the future and how they come together to form Smart Cities and Public Spaces that we will live in And Healthcare including implantable medical devices and social care And often how many of these individual systems interact to form a systems of systems If anyone wants to discuss PETRAS with me then please do contact me
  6. Id and track -> reassembly, nature of the object, how it feels, history background audience and researcher  reception history impact on culture sociocultural impact . Audiences device to pick up data object context aware. Insurance premiums other conversion rates…