You are on page 1of 1

IoT Security & Privacy: Threats and Challenges

Yong Ho Hwang
Software R&D Center, Samsung Electronics Co., LTD,
yongh.hwang@samsung.com

ABSTRACT
The era of the Internet of Things (IoT) has already started E2E Data Life-cycle Protection To guarantee data se-
and it will profoundly change our way of life. While IoT curity in IoT environment, end-to-end (E2E) data protec-
provides us many valuable benefits, IoT also exposes us to tion over entire IoT service should be provided. Various
many different types of security threats in our daily life. data is generated from many things and is spontaneously
Before the advent of IoT, most security threats were just shared with other things including cloud under public net-
related to information leakage and the loss of service. With work. Therefore, it requires the data protection framework
IoT, security threats have become closely related to our non- to control and manage privacy information and confidential
virtual lives and they can directly influence physical security data in full data life-cycle.
risk. Secure Things Orchestration Things in IoT are organi-
The Internet of Things consists of various platforms and cally operated by connecting with other things, and the con-
devices with different capabilities, and each system will need nected things are dynamically changed. In such a situation,
security solutions depending on its characteristics. There the connected things should be able to keep the required
is a demand for security solutions that are able to support security level. For instance, local devices and sensors used
multi-profile platforms and provide equivalent security levels in home should communicate securely with each other, and
for various device interactions. In addition, user privacy should be securely managed to support multi-things orches-
will become more important in the IoT environment because tration. In addition, when they communicate with external
a lot of personal information will be delivered and shared thing, all things should be operated under the same security
among connected things. Therefore, we need mechanisms to policy.
protect personal data and monitor their flow from things to
the cloud. In this talk, we describe threats and concerns for Security Platform for Multi-Level Things There are
security and privacy arising from IoT services, and introduce many different types of platforms and devices from tiny sen-
approaches to solve these security and privacy issues in the sor to smart device in IoT environments. As we mentioned
industrial field. above, if one thing is any security hole, it can be easily prop-
agated to other things and it is difficult to guarantee the
security with multi-things. Thus, for each thing, the secure
1. SECURITY THREATS IN IOT SW execution environment should be provided. However,
For the Internet of Things (IoT) services, there are numer- since all things have different capabilities such as computing
ous types of things from light to rich devices; the commu- power and memory size, etc., the same security architecture
nication between things occurs through various networks . cannot be applied. So, security solutions to provide proper
It means that there are security risks in each device/network security level according to capabilities and roles of things
layer and the user privacy can be exposed from diverse routes. should be developed.
Therefore, all kinds of attack scenarios in the previous IT
Visible/Usable Security & Privacy Many security and
environment should be re-considered more seriously.
privacy issues are mostly caused by misconfiguration of users.
However, it is very difficult and unrealistic for users to en-
2. SECURITY THREATS IN IOT force the understanding of complex security/privacy policies
We introduce the concerns and the high-level approaches or rules. Thus, providing the usable solutions to easily set-
to provide secure IoT environment. up or automatically apply security/privacy policy is very
important.
Permission to make digital or hard copies of all or part of this work for Bio: Yong Ho Hwang is the head of Security Lab at SW
personal or classroom use is granted without fee provided that copies are not
R&D Center of Samsung Electronics. He received PhD de-
made or distributed for profit or commercial advantage and that copies bear
this notice and the full citation on the first page. Copyrights for components gree in Electronic and Electrical Engineering from POSTECH,
of this work owned by others than ACM must be honored. Abstracting with and worked in SPAR Lab/Computer Science at the Johns
credit is permitted. To copy otherwise, or republish, to post on servers or to Hopkins University as a post-doctoral researcher. His in-
redistribute to lists, requires prior specific permission and/or a fee. Request terests are in applied cryptography, mobile security, system
permissions from permissions@acm.org. security, network security, etc.
IOTPTS’15 April 14, 2015, Singapore
Copyright 2015 ACM 978-1-4503-3449-5/15/04 ...$15.00.
http://dx.doi.org/10.1145/2732209.2732216

You might also like