SlideShare a Scribd company logo
1 of 65
© Waher Data AB, 2018.
Smart City Lecture 3
An Open and/or Secure Smart City?
© Waher Data AB, 2018.
1. Recapture
© Waher Data AB, 2018.
Smart City / Society
 Automation
 Open Data
 Transport
 Traffic (C-ITS)
 Parking
 Utilities
 Health Care
 Law enforcement
 Schools
 Libraries
 Waste management
 Citizens?
 …
Smart for whom?
© Waher Data AB, 2018.
Vision of a Smart City
 Ubiquitous access to interoperable
sensors and things.
 Ubiquitous access to data and
information from society’s authorities.
 Access to smart services in all niches of
society.
 Definition of ownership of information.
 Protection of Privacy, by design and by
default.
 Market for access to things and data.
© Waher Data AB, 2018.
2. IoT
Ex-Director of National Intelligence
James R. Clapper
http://www.popsci.com/clapper-americas-greatest-threat-is-internet-things
”America's greatest
threat is the
Internet of Things”
Feb 9, 2016
© Waher Data AB, 2018.
Problem domain
IoT systems particularly vulnerable:
 Long-term operation
 Technologies become obsolete
 Lack of updates
 Invisible operation
 No visible clues something is wrong
 No human operator (for normal use case)
 Lack of supervision
 Larger scale
 More units and attack surfaces
© Waher Data AB, 2018.
Vulnerabilities
 National Security
 Exploiting
 Surveillance
 Logistics
 Utilities
 Health Care
 Traffic (C-ITS)
 Residential systems
 Law enforcement
 Waste management
 Schools
 Parking
 Libraries
 Monitoring citizens
 …
© Waher Data AB, 2018.
What is Government Doing?
Mayor of Stockholm (2017) wants to “turn
Stockholm into the world's smartest city”
Also:
 “I don't have the answers”
 “powered rubbish bins”
 “making small steps forward”
 “being a connected city”
 “how little interest there has been locally”
 “Security is one of the biggest questions … when we're
talking about key and lock systems”
No strategy at all. Can you compete in
world’s most vulnerable city?
https://www.thelocal.se/20170731/meet-karin-wanngard-the-mayor-who-wants-to-turn-stockholm-into-the-worlds-smartest-city
© Waher Data AB, 2018.
What must Governments do?
Governments must make sure to provide
a strong foundation on which smart
services can be built.
 Broadband access were
infrastructure projects.
 Giving access to broadband for
everyone was a strategy.
 Likewise, Smart City Infrastructure
must be defined, required in RFPs, and
provided to everyone.
© Waher Data AB, 2018.
Options?
Sealed secure systems?
or
Open, Interoperable, but vulnerable
systems?
or is it possible to have:
Open, Interoperable & secure systems?
© Waher Data AB, 2018.
3. Openness
© Waher Data AB, 2018.
Open Society
How are open societies defined?
 Personal decisions
 Exchange of ideas
 Pluralism
 Responsibility under the law
 Government transparency
 Privacy
© Waher Data AB, 2018.
Digital Open Society
How do we digitally model:
 Personal decisions?
 Exchange of ideas?
 Pluralism?
 Responsibility under the law?
 Government transparency?
 Privacy?
© Waher Data AB, 2018.
Personal decisions
To allow maximum freedom of choice:
 Loosely coupled
Architectures
Communication Patterns
Data representation
 Federation
✓✓✓✓ XMPP, IoT Harmonization
✓✓✓ CoAP(S)
✓✓ HTTP(S), LWM2M
✓ MQTT, Blockchain
© Waher Data AB, 2018.
Exchange of Ideas
Translate into Interoperability:
 Transport (Communication)
 Representation
 Operation
✓✓✓ LWM2M, IoT Harmonization
✓✓ CoAP(S), HTTP(S)
✓ XMPP, MQTT
✗ Blockchain
© Waher Data AB, 2018.
Pluralism
Same infrastructure can support:
 Different types of devices
 Different types of solutions
 Different manufacturers
 Different service providers
 Different operators
✓✓✓✓✓ HTTP(S), CoAP(S), XMPP, IoT Harmonization
✓✓ LWM2M, MQTT
✓ Blockchain
© Waher Data AB, 2018.
Responsibility under the law
Requires:
 Strong identities
Verifiable
Legal
 Smart Contacts
 Digital Signatures
✓✓✓✓ Blockchain, IoT Harmonization
✓ HTTP(S), LWM2M, XMPP
✗ CoAP(S), MQTT
© Waher Data AB, 2018.
Government Transparency
5-star Open Data:
 Availability
 Structured
 Open format
 URIs
 Links
⋆⋆⋆⋆ CoAP(S), HTTP(S), IoT Harmonization
⋆⋆⋆ LWM2M
⋆⋆ Blockchain, MQTT, XMPP
© Waher Data AB, 2018.
Privacy
Basic requirements (see lectures 1 & 2):
 Processing on the Edge
 Data ownership
 Actively protects privacy
 Does not contradict GDPR requirements
✓✓✓✓ IoT Harmonization
✓✓ XMPP
✓ HTTP(S), CoAP(S), MQTT, LWM2M
✗ Blockchain
© Waher Data AB, 2018.
Openness Summary
Block
chain
CoAP HTTP IoT.H. LW
M2M
MQTT XMPP
Personal ✓ ✓✓✓ ✓✓ ✓✓✓✓ ✓✓ ✓ ✓✓✓✓
Interop. ✗ ✓✓ ✓✓ ✓✓✓ ✓✓✓ ✓ ✓
Plurality ✓ ✓✓✓✓✓ ✓✓✓✓✓ ✓✓✓✓✓ ✓✓ ✓✓ ✓✓✓✓✓
Law ✓✓✓✓ ✗ ✓ ✓✓✓✓ ✓ ✗ ✓
Transparency ⋆⋆ ⋆⋆⋆⋆ ⋆⋆⋆⋆ ⋆⋆⋆⋆ ⋆⋆⋆ ⋆⋆ ⋆⋆
Privacy ✗ ✓ ✓ ✓✓✓✓ ✓ ✓ ✓✓
8 15 15 24 12 7 15
© Waher Data AB, 2018.
4. Security
© Waher Data AB, 2018.
Identities
Identities affect your security:
 Anonymity
 Strong identities
Pseudonyms
© Waher Data AB, 2018.
Anonymity
 Protects
Whistle blower
Dissident
(Criminal)
(Terrorist)
 Security decisions difficult
 Facilitates leaking personal data
How do you protect sensitive information, if you don’t know
who’s on the other end?
© Waher Data AB, 2018.
Strong Identities
 Protects information owners
 Allows selective responses
 Can be used to track
individuals
Logging for security purposes is legitimate. How can you
make sure logging is only used for security purposes?
(One answer: Use of standardized, open software that are
agnostic to the purposes of processing, such as brokers and
End-to-End encryption of payloads.)
© Waher Data AB, 2018.
Decentralization
Decentralization has security implications:
 More attack surfaces.
 But value of each node is small.
 Value/Effort ratio small.
 Easier to protect.
 Massive data breaches difficult.
 You don’t put all your eggs into the same basket.
 More resilient.
 End-to-end encryption.
© Waher Data AB, 2018.
4.1 Security
HTTP / HTTPS
© Waher Data AB, 2018.
HTTP(S)
 Standardized by IETF
 Popular
 Well known
 Request/Response communication pattern
 Web-socket
 Bidirectional
 Asynchronous
 TLS transport encryption
 Problems:
 Topology
 Middleware
 Distributed/Global Identities
 Difficult to make secure
© Waher Data AB, 2018.
Topology Problem
 Actors
 Client
 Server
 Server must be reachable by the client
 Thing a server
 Natural, from a conceptual perspective.
 Sacrifices security: “hole punching”
 Thing a client
 Unnatural
 Sacrifices privacy
 Creates potential bottlenecks
 Server or Middleware processing
© Waher Data AB, 2018.
Middleware
 How can a client communicate with a client?
 “Middle”-ware: Software in the middle of clients.
 Acts as servers to both clients.
 Proprietary solutions
 Multitudes
 Hybrid solutions
 LWM2M (just data collection)
 MQTT (proprietary HTTP bindings)
 Standardized solutions
 XMPP (BOSH or Web-socket bindings)
© Waher Data AB, 2018.
Scalability Problem
 C10K problem
 Difficulty in creating scalable middleware.
 Vulnerability increases by scale
 Alternative: Federated middleware
 XMPP (standardized option)
© Waher Data AB, 2018.
Identity Problem
 Authentication
 Server typically manages accounts
 Distributed identities difficult
 Reversed original architecture
 Difficult to make security decisions in a
distributed environment.
Server
Client
Client
Client
Client Client
Server
Server
Server
Server
© Waher Data AB, 2018.
4.2 Security
MQTT
© Waher Data AB, 2018.
MQTT
 Standardized by OASIS
 Popular
 Most used protocol for IoT
 Publish/Subscribe communication pattern
 Efficiently distributes data to multiple
subscribers
 The broker solves the topology problem.
 TLS Transport Encryption
 Problems:
 Multiple serious design-vulnerabilities
 Scalability
 Identities
© Waher Data AB, 2018.
Publish/Subscribe
© Waher Data AB, 2018.
Vulnerabilities by design 1(2)
 No forwarded identities
 Authorization becomes impossible by things
 Makes injection a great threat
 Control signals
 False data
 Bandwidth depletion
 Lack of privacy
 No negotiation of who can subscribe
 Access control out-of-band (proprietary)
 Wildcards
 Makes it easy to eavesdrop
 Scalability
 Topic tree and number of devices have limits
 No natural way to federate
 How do you interoperate across domains?
© Waher Data AB, 2018.
Vulnerabilities by design 2(2)
 Passwords in clear text*
 Out-of-band (proprietary) authentication with
client certificates required
 Lack of content meta-data*
 Impedes interoperability
 Indeterministic
 Cannot foresee the consequences of an operation
 Relies on careful operation of broker
 Overview of topic tree difficult
 Who operates the broker across domains?
(*) Partially solved if explicitly used in MQTT v5.
© Waher Data AB, 2018.
Warnings
 Governments warn against bad
MQTT implementations.
 MQTT is notoriously difficult to use
securely.
 Use it only in internal secured networks.
https://cert.se/2016/09/mqtt-i-sverige
© Waher Data AB, 2018.
4.3 Security
CoAP / CoAPS
© Waher Data AB, 2018.
CoAP(S)
 Standardized by IETF
 “Binary HTTP”
 Resource-constrained networks
 Resource-constrained devices
 UDP
 Solves C10K problem
 Communication Patterns
 Request Response
 Event Subscription
 Multi-casting
 DTLS transport encryption
 Not for multi-casting
© Waher Data AB, 2018.
Limitations
 Still has topology problem
 Assumes middleware for Internet use
 LWM2M is standardized middleware
 Some interoperability
 IPSO Smart Objects
 Only for data collection
 Difficult to interoperate between things
 Distributed identities still difficult.
© Waher Data AB, 2018.
4.4 Security
LWM2M
© Waher Data AB, 2018.
LWM2M
 Standardized by OMA
 IPSO Smart Objects
 Adds security to CoAP
Manages keys and authentication
Bootstrapping
Device Management
Access Control Lists
© Waher Data AB, 2018.
4.5 Security
XMPP
© Waher Data AB, 2018.
XMPP
 Standardized by IETF
 Federated
 Globally scalable
 Extensible
 XML namespaces
 Open
 Robust
 Secure
 Interoperable
 Binding
 Socket, HTTP, WebSocket
© Waher Data AB, 2018.
Communication
 Brokers
 Accounts
 Rosters
 Routing
 Federation
 Topology insensitive
 Server-less
 Peer-to-peer
 Authentication
 SASL
 Encryption
 TLS
 E2E
© Waher Data AB, 2018.
Federated Brokers
 Authenticate clients
 SASL
 Cooperate (federation)
 Forward identities
 Authorization
 Roster
 Presence
 Subscription
 Solve
 Topology problem.
 Latency problem.
 Scalability problem.
© Waher Data AB, 2018.
Security
Standard layers of security:
 Global Identities (always forwarded)
 Authentication (SASL)
 Encryption (TLS)
 Authorization (presence subscription)
 Blocking
 Spam reporting
 Provisioning
© Waher Data AB, 2018.
Communication Patterns
Intrinsic patterns:
 Asynchronous messages (message)
 Request/Response (iq)
 Publish/Subscribe (presence)
Extended
 Publish/Subscribe
(extended by XEP-0060, 0163)
 Multicasting
(extended by XEP-0045)
© Waher Data AB, 2018.
XMPP & Privacy
Data protection by design & by default:
 Decentralization
 Ubiquitous encryption
 Even end-to-end encryption
 Global identities
 Authenticated
 Forwarded
 Authorization
 Consent-based negotiation
© Waher Data AB, 2018.
Communication Patterns (Flexibility)
CoAP HTTP IoT.H. LW
M2M
MQTT XMPP
Async. Msg. ✓ ✓ ✓ ✓
Req/Resp. ✓ ✓ ✓ ✓ ✓
Pub/Sub. ✓✓✓ ✓ ✓✓✓
Federation ✓ ✓ ✓ ✓
Broker ✓ ✓ ✓
Severless ✓ ✓ ✓
P2P7 ✓ ✓
4 2 9 2 2 9
© Waher Data AB, 2018.
4.6 Security
Blockchain
© Waher Data AB, 2018.
Blockchain
 Cryptographic Algorithms fixed
 Has an implicit built-in expiration time
 Lends itself to future frauds
 Vulnerable in Heterogenous networks
Requires constant hardware updates
 Severe privacy issues
 Energy inefficient
© Waher Data AB, 2018.
Blockchain & Privacy
 Blocks cannot
 be deleted
on request
after a given time
… or ever
 be corrected
 Access is given to all or nothing
 Public access has to be assumed
 Hashes of personal information is still
personal
Blockchain is not suitable for personal information at all.
© Waher Data AB, 2018.
5. Summary
© Waher Data AB, 2018.
Security Summary
Block
chain
CoAP HTTP IoT.H. LW
M2M
MQTT XMPP
Identities ✓ ✓ ✓ ✓ ✓
Authentication ✓ ✓ ✓ ✓ ✓
Authorization ✓ ✓ ✓
Encryption ✓ ✓ ✓ ✓ ✓ ✓
E2E ✓ ✓
Consent ✓ ✓
Decentralized ✓ ✓ ✓ ✓
By design ✓ ✓ ✓
Flexibility 4 2 9 2 2 9
Openness 8 15 15 24 12 7 15
11 21 20 41 19 10 32
© Waher Data AB, 2018.
6. Openness + Security
For Things
© Waher Data AB, 2018.
Strong Foundation
Things are “stupid” and need help with:
 Decision Support
 Ownership
 Owner consent
 Lifecycle
 Transfer of ownership
 Decommissioning
 Discovery
 Interoperability
 Data
 Operations
© Waher Data AB, 2018.
IoT Harmonization (IEEE 1451-99)
 Sensor Data
 Control Operations
 Localization (M2M, M2H)
 Tokens for distributed transactions
 Decision Support (for devices)
 Provisioning (for owners)
 Peer-to-Peer communication
 End-to-end encryption
 Concentrator/Bridge (“Thing of things”)
 Discovery
 Ownership
 Clock Synchronization
 Secure Account Creation
 Legal Identities
 Contracts
 Automated provisioning
 Economic feedback
https://gitlab.com/IEEE-SA/XMPPI/IoT
© Waher Data AB, 2018.
Backbone
 Efficiency
 Interoperability
 Global scalability
 Bridges technologies
vs
© Waher Data AB, 2018.
7. Events
© Waher Data AB, 2018.
Smart City Lectures*
1. How to build a Smart City (Oct 4th)
2. Privacy in the Smart City (Oct 18th)
3. An Open and/or Secure Smart City (Oct 25th)
4. Harmonizing the Internet of Things (Nov 8th)
5. Introduction to Encryption (Nov 15th)
6. Earning by Sharing in the Smart City (Nov 22th)
7. …
8. …
(*) Funded by Swedish Internet Fund.
© Waher Data AB, 2018.
Smart City Labs*
1. Sensors and actuators (Oct 10th)
2. Connect and chat with your device (Oct 17th)
3. Publishing data from your sensor (Oct 24th)
4. Publishing and discovering devices (Nov 7th)
5. Controlling actuators (Nov 14th)
6. Decision Support for your devices (Nov 21th)
7. …
8. …
(*) Funded by Swedish Internet Fund.
© Waher Data AB, 2018.
 Raspberry Pi & Arduino
 Sensors, Actuators, Controllers,
Concentrators, Bridges
 Protocols:
MQTT, HTTP, CoAP, LWM2M, XMPP
 Interoperability
 Social Interaction
 Decision Support
 Product Lifecycle
 IoT Service Platforms
 IoT Harmonization
 Security
 Privacy
Amazon
Packt
Microsoft Store
Contact: https://waher.se/, https://littlesister.se/
Mastering Internet of Things
© Waher Data AB, 2018.
8. Open Discussion
Ownership?
Privacy?
Security?
Surveillance?
Interoperability?
Cool stuff?
Qué?
Where’s the Money?
Who pays?
What could go wrong?
Little Sister?
Harmonization?

More Related Content

What's hot

What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonUlf Mattsson
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksAhmed Banafa
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
Blockchain, AI, IOT, Crypto Challenges and opportunities for the Energy Oil a...
Blockchain, AI, IOT, Crypto Challenges and opportunities for the Energy Oil a...Blockchain, AI, IOT, Crypto Challenges and opportunities for the Energy Oil a...
Blockchain, AI, IOT, Crypto Challenges and opportunities for the Energy Oil a...Dinis Guarda
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?Anchises Moraes
 
iDate: AI and blockchain
iDate: AI and blockchainiDate: AI and blockchain
iDate: AI and blockchain3G4G
 
Blockchain Technology and its role in the process of public sector innovation
Blockchain Technology and its role in the process of public sector innovationBlockchain Technology and its role in the process of public sector innovation
Blockchain Technology and its role in the process of public sector innovationsamossummit
 
7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain TestingCygnet Infotech
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBiagio Botticelli
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 
IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Servicekidozen
 
IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)Dania Rashid
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
 
An Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoTAn Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoTStylight
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architectureElias Hasnat
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 

What's hot (20)

What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
Blockchain, AI, IOT, Crypto Challenges and opportunities for the Energy Oil a...
Blockchain, AI, IOT, Crypto Challenges and opportunities for the Energy Oil a...Blockchain, AI, IOT, Crypto Challenges and opportunities for the Energy Oil a...
Blockchain, AI, IOT, Crypto Challenges and opportunities for the Energy Oil a...
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
iDate: AI and blockchain
iDate: AI and blockchainiDate: AI and blockchain
iDate: AI and blockchain
 
Blockchain Technology and its role in the process of public sector innovation
Blockchain Technology and its role in the process of public sector innovationBlockchain Technology and its role in the process of public sector innovation
Blockchain Technology and its role in the process of public sector innovation
 
7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Service
 
IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
An Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoTAn Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoT
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 

Similar to Smart City Lecture 3 - An Open And/Or Secure Smart City

Smart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart CitySmart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart CityPeter Waher
 
De wondere wereld van cloud en sddc 26 nov 2013 ht v1.1
De wondere wereld van cloud en sddc 26 nov 2013 ht v1.1De wondere wereld van cloud en sddc 26 nov 2013 ht v1.1
De wondere wereld van cloud en sddc 26 nov 2013 ht v1.1EMC Nederland
 
Privacy for IoT with XMPP
Privacy for IoT with XMPPPrivacy for IoT with XMPP
Privacy for IoT with XMPPPeter Waher
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
The Top-5 Technologies All Organizations Must Understand
The Top-5 Technologies All Organizations Must UnderstandThe Top-5 Technologies All Organizations Must Understand
The Top-5 Technologies All Organizations Must UnderstandShahin Khan
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesPistoia Alliance
 
SDChain - Blockchain 4.0: To create a blockchain ecosystem of trusted IoT dig...
SDChain - Blockchain 4.0: To create a blockchain ecosystem of trusted IoT dig...SDChain - Blockchain 4.0: To create a blockchain ecosystem of trusted IoT dig...
SDChain - Blockchain 4.0: To create a blockchain ecosystem of trusted IoT dig...Liu Jen Hao
 
Blockchain Hype & Realities, Dean Bubley, TADSummit 2018
Blockchain Hype & Realities, Dean Bubley, TADSummit 2018Blockchain Hype & Realities, Dean Bubley, TADSummit 2018
Blockchain Hype & Realities, Dean Bubley, TADSummit 2018Alan Quayle
 
Distributed Ledger Technologies; What's up with all these blockchains?
Distributed Ledger Technologies; What's up with all these blockchains?Distributed Ledger Technologies; What's up with all these blockchains?
Distributed Ledger Technologies; What's up with all these blockchains?Chuck Bair
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
Roberto minerva 20181130
Roberto minerva 20181130  Roberto minerva 20181130
Roberto minerva 20181130 Roberto Minerva
 
HiveMQ Cloud Webinar
HiveMQ Cloud WebinarHiveMQ Cloud Webinar
HiveMQ Cloud WebinarHiveMQ
 
neXt Curve Mobile World Congress 2018 Key Takeaways
neXt Curve Mobile World Congress 2018 Key TakeawaysneXt Curve Mobile World Congress 2018 Key Takeaways
neXt Curve Mobile World Congress 2018 Key TakeawaysLeonard Lee
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Mychal McCabe
 
Intro blockchain beyond confidential compute. views from oasis labs, ibm and...
Intro  blockchain beyond confidential compute. views from oasis labs, ibm and...Intro  blockchain beyond confidential compute. views from oasis labs, ibm and...
Intro blockchain beyond confidential compute. views from oasis labs, ibm and...LennartF
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkReal-Time Innovations (RTI)
 
Building a reliable and scalable IoT platform with MongoDB and HiveMQ
Building a reliable and scalable IoT platform with MongoDB and HiveMQBuilding a reliable and scalable IoT platform with MongoDB and HiveMQ
Building a reliable and scalable IoT platform with MongoDB and HiveMQDominik Obermaier
 

Similar to Smart City Lecture 3 - An Open And/Or Secure Smart City (20)

IoT Security
IoT SecurityIoT Security
IoT Security
 
Smart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart CitySmart City Lecture 6 - Earning by Sharing in the Smart City
Smart City Lecture 6 - Earning by Sharing in the Smart City
 
Blockchain on AWS
Blockchain on AWSBlockchain on AWS
Blockchain on AWS
 
De wondere wereld van cloud en sddc 26 nov 2013 ht v1.1
De wondere wereld van cloud en sddc 26 nov 2013 ht v1.1De wondere wereld van cloud en sddc 26 nov 2013 ht v1.1
De wondere wereld van cloud en sddc 26 nov 2013 ht v1.1
 
Privacy for IoT with XMPP
Privacy for IoT with XMPPPrivacy for IoT with XMPP
Privacy for IoT with XMPP
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Major Market Shifts in IT
Major Market Shifts in ITMajor Market Shifts in IT
Major Market Shifts in IT
 
The Top-5 Technologies All Organizations Must Understand
The Top-5 Technologies All Organizations Must UnderstandThe Top-5 Technologies All Organizations Must Understand
The Top-5 Technologies All Organizations Must Understand
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab Slides
 
SDChain - Blockchain 4.0: To create a blockchain ecosystem of trusted IoT dig...
SDChain - Blockchain 4.0: To create a blockchain ecosystem of trusted IoT dig...SDChain - Blockchain 4.0: To create a blockchain ecosystem of trusted IoT dig...
SDChain - Blockchain 4.0: To create a blockchain ecosystem of trusted IoT dig...
 
Blockchain Hype & Realities, Dean Bubley, TADSummit 2018
Blockchain Hype & Realities, Dean Bubley, TADSummit 2018Blockchain Hype & Realities, Dean Bubley, TADSummit 2018
Blockchain Hype & Realities, Dean Bubley, TADSummit 2018
 
Distributed Ledger Technologies; What's up with all these blockchains?
Distributed Ledger Technologies; What's up with all these blockchains?Distributed Ledger Technologies; What's up with all these blockchains?
Distributed Ledger Technologies; What's up with all these blockchains?
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Roberto minerva 20181130
Roberto minerva 20181130  Roberto minerva 20181130
Roberto minerva 20181130
 
HiveMQ Cloud Webinar
HiveMQ Cloud WebinarHiveMQ Cloud Webinar
HiveMQ Cloud Webinar
 
neXt Curve Mobile World Congress 2018 Key Takeaways
neXt Curve Mobile World Congress 2018 Key TakeawaysneXt Curve Mobile World Congress 2018 Key Takeaways
neXt Curve Mobile World Congress 2018 Key Takeaways
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)
 
Intro blockchain beyond confidential compute. views from oasis labs, ibm and...
Intro  blockchain beyond confidential compute. views from oasis labs, ibm and...Intro  blockchain beyond confidential compute. views from oasis labs, ibm and...
Intro blockchain beyond confidential compute. views from oasis labs, ibm and...
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
Building a reliable and scalable IoT platform with MongoDB and HiveMQ
Building a reliable and scalable IoT platform with MongoDB and HiveMQBuilding a reliable and scalable IoT platform with MongoDB and HiveMQ
Building a reliable and scalable IoT platform with MongoDB and HiveMQ
 

More from Peter Waher

Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Peter Waher
 
Interoperabilidad e Internet
Interoperabilidad e InternetInteroperabilidad e Internet
Interoperabilidad e InternetPeter Waher
 
Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Peter Waher
 
New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0Peter Waher
 
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...Peter Waher
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...Peter Waher
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...Peter Waher
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewPeter Waher
 
Smart contracts for certification of smart devices
Smart contracts for certification of smart devicesSmart contracts for certification of smart devices
Smart contracts for certification of smart devicesPeter Waher
 
Federated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applicationsFederated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applicationsPeter Waher
 
Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Peter Waher
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesPeter Waher
 
Smart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsSmart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsPeter Waher
 
Smart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering DevicesSmart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering DevicesPeter Waher
 
Smart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your SensorSmart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your SensorPeter Waher
 
Smart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DeviceSmart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DevicePeter Waher
 
Smart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and ActuatorsSmart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and ActuatorsPeter Waher
 
XMPP and IoT - an overview
XMPP and IoT - an overviewXMPP and IoT - an overview
XMPP and IoT - an overviewPeter Waher
 
XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)Peter Waher
 
Web 3.0 & IoT (English)
Web 3.0 & IoT (English)Web 3.0 & IoT (English)
Web 3.0 & IoT (English)Peter Waher
 

More from Peter Waher (20)

Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
Tokenization of sustainable real estate in Smart Cities - Monetization as bas...
 
Interoperabilidad e Internet
Interoperabilidad e InternetInteroperabilidad e Internet
Interoperabilidad e Internet
 
Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99
 
New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0New business opportunities in smart societies and industry 4.0
New business opportunities in smart societies and industry 4.0
 
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
IEEE Standards Impact in IoT and 5G, Day 1, Session 3 - Smart contracts, Mone...
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
IEEE Standards Impact in IoT and 5G, Day 1, Session 2 - Communication & Opera...
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
 
Smart contracts for certification of smart devices
Smart contracts for certification of smart devicesSmart contracts for certification of smart devices
Smart contracts for certification of smart devices
 
Federated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applicationsFederated and legal identities in industrial and financial applications
Federated and legal identities in industrial and financial applications
 
Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...Secure interoperation across cyber physical systems in smart societies with i...
Secure interoperation across cyber physical systems in smart societies with i...
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your Devices
 
Smart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling ActuatorsSmart City Lab 5 - Controlling Actuators
Smart City Lab 5 - Controlling Actuators
 
Smart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering DevicesSmart City Lab 4 - Publishing and Discovering Devices
Smart City Lab 4 - Publishing and Discovering Devices
 
Smart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your SensorSmart City Lab 3 - Publishing Data from your Sensor
Smart City Lab 3 - Publishing Data from your Sensor
 
Smart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your DeviceSmart City Lab 2 - Connect and Chat with your Device
Smart City Lab 2 - Connect and Chat with your Device
 
Smart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and ActuatorsSmart City Lab 1 - Sensors and Actuators
Smart City Lab 1 - Sensors and Actuators
 
XMPP and IoT - an overview
XMPP and IoT - an overviewXMPP and IoT - an overview
XMPP and IoT - an overview
 
XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)XMPP IoT Sensor Data (XEP-0323)
XMPP IoT Sensor Data (XEP-0323)
 
Web 3.0 & IoT (English)
Web 3.0 & IoT (English)Web 3.0 & IoT (English)
Web 3.0 & IoT (English)
 

Recently uploaded

Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 

Recently uploaded (20)

Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 

Smart City Lecture 3 - An Open And/Or Secure Smart City

  • 1. © Waher Data AB, 2018. Smart City Lecture 3 An Open and/or Secure Smart City?
  • 2. © Waher Data AB, 2018. 1. Recapture
  • 3. © Waher Data AB, 2018. Smart City / Society  Automation  Open Data  Transport  Traffic (C-ITS)  Parking  Utilities  Health Care  Law enforcement  Schools  Libraries  Waste management  Citizens?  … Smart for whom?
  • 4. © Waher Data AB, 2018. Vision of a Smart City  Ubiquitous access to interoperable sensors and things.  Ubiquitous access to data and information from society’s authorities.  Access to smart services in all niches of society.  Definition of ownership of information.  Protection of Privacy, by design and by default.  Market for access to things and data.
  • 5. © Waher Data AB, 2018. 2. IoT
  • 6. Ex-Director of National Intelligence James R. Clapper http://www.popsci.com/clapper-americas-greatest-threat-is-internet-things ”America's greatest threat is the Internet of Things” Feb 9, 2016
  • 7. © Waher Data AB, 2018. Problem domain IoT systems particularly vulnerable:  Long-term operation  Technologies become obsolete  Lack of updates  Invisible operation  No visible clues something is wrong  No human operator (for normal use case)  Lack of supervision  Larger scale  More units and attack surfaces
  • 8. © Waher Data AB, 2018. Vulnerabilities  National Security  Exploiting  Surveillance  Logistics  Utilities  Health Care  Traffic (C-ITS)  Residential systems  Law enforcement  Waste management  Schools  Parking  Libraries  Monitoring citizens  …
  • 9. © Waher Data AB, 2018. What is Government Doing? Mayor of Stockholm (2017) wants to “turn Stockholm into the world's smartest city” Also:  “I don't have the answers”  “powered rubbish bins”  “making small steps forward”  “being a connected city”  “how little interest there has been locally”  “Security is one of the biggest questions … when we're talking about key and lock systems” No strategy at all. Can you compete in world’s most vulnerable city? https://www.thelocal.se/20170731/meet-karin-wanngard-the-mayor-who-wants-to-turn-stockholm-into-the-worlds-smartest-city
  • 10. © Waher Data AB, 2018. What must Governments do? Governments must make sure to provide a strong foundation on which smart services can be built.  Broadband access were infrastructure projects.  Giving access to broadband for everyone was a strategy.  Likewise, Smart City Infrastructure must be defined, required in RFPs, and provided to everyone.
  • 11. © Waher Data AB, 2018. Options? Sealed secure systems? or Open, Interoperable, but vulnerable systems? or is it possible to have: Open, Interoperable & secure systems?
  • 12. © Waher Data AB, 2018. 3. Openness
  • 13. © Waher Data AB, 2018. Open Society How are open societies defined?  Personal decisions  Exchange of ideas  Pluralism  Responsibility under the law  Government transparency  Privacy
  • 14. © Waher Data AB, 2018. Digital Open Society How do we digitally model:  Personal decisions?  Exchange of ideas?  Pluralism?  Responsibility under the law?  Government transparency?  Privacy?
  • 15. © Waher Data AB, 2018. Personal decisions To allow maximum freedom of choice:  Loosely coupled Architectures Communication Patterns Data representation  Federation ✓✓✓✓ XMPP, IoT Harmonization ✓✓✓ CoAP(S) ✓✓ HTTP(S), LWM2M ✓ MQTT, Blockchain
  • 16. © Waher Data AB, 2018. Exchange of Ideas Translate into Interoperability:  Transport (Communication)  Representation  Operation ✓✓✓ LWM2M, IoT Harmonization ✓✓ CoAP(S), HTTP(S) ✓ XMPP, MQTT ✗ Blockchain
  • 17. © Waher Data AB, 2018. Pluralism Same infrastructure can support:  Different types of devices  Different types of solutions  Different manufacturers  Different service providers  Different operators ✓✓✓✓✓ HTTP(S), CoAP(S), XMPP, IoT Harmonization ✓✓ LWM2M, MQTT ✓ Blockchain
  • 18. © Waher Data AB, 2018. Responsibility under the law Requires:  Strong identities Verifiable Legal  Smart Contacts  Digital Signatures ✓✓✓✓ Blockchain, IoT Harmonization ✓ HTTP(S), LWM2M, XMPP ✗ CoAP(S), MQTT
  • 19. © Waher Data AB, 2018. Government Transparency 5-star Open Data:  Availability  Structured  Open format  URIs  Links ⋆⋆⋆⋆ CoAP(S), HTTP(S), IoT Harmonization ⋆⋆⋆ LWM2M ⋆⋆ Blockchain, MQTT, XMPP
  • 20. © Waher Data AB, 2018. Privacy Basic requirements (see lectures 1 & 2):  Processing on the Edge  Data ownership  Actively protects privacy  Does not contradict GDPR requirements ✓✓✓✓ IoT Harmonization ✓✓ XMPP ✓ HTTP(S), CoAP(S), MQTT, LWM2M ✗ Blockchain
  • 21. © Waher Data AB, 2018. Openness Summary Block chain CoAP HTTP IoT.H. LW M2M MQTT XMPP Personal ✓ ✓✓✓ ✓✓ ✓✓✓✓ ✓✓ ✓ ✓✓✓✓ Interop. ✗ ✓✓ ✓✓ ✓✓✓ ✓✓✓ ✓ ✓ Plurality ✓ ✓✓✓✓✓ ✓✓✓✓✓ ✓✓✓✓✓ ✓✓ ✓✓ ✓✓✓✓✓ Law ✓✓✓✓ ✗ ✓ ✓✓✓✓ ✓ ✗ ✓ Transparency ⋆⋆ ⋆⋆⋆⋆ ⋆⋆⋆⋆ ⋆⋆⋆⋆ ⋆⋆⋆ ⋆⋆ ⋆⋆ Privacy ✗ ✓ ✓ ✓✓✓✓ ✓ ✓ ✓✓ 8 15 15 24 12 7 15
  • 22. © Waher Data AB, 2018. 4. Security
  • 23. © Waher Data AB, 2018. Identities Identities affect your security:  Anonymity  Strong identities Pseudonyms
  • 24. © Waher Data AB, 2018. Anonymity  Protects Whistle blower Dissident (Criminal) (Terrorist)  Security decisions difficult  Facilitates leaking personal data How do you protect sensitive information, if you don’t know who’s on the other end?
  • 25. © Waher Data AB, 2018. Strong Identities  Protects information owners  Allows selective responses  Can be used to track individuals Logging for security purposes is legitimate. How can you make sure logging is only used for security purposes? (One answer: Use of standardized, open software that are agnostic to the purposes of processing, such as brokers and End-to-End encryption of payloads.)
  • 26. © Waher Data AB, 2018. Decentralization Decentralization has security implications:  More attack surfaces.  But value of each node is small.  Value/Effort ratio small.  Easier to protect.  Massive data breaches difficult.  You don’t put all your eggs into the same basket.  More resilient.  End-to-end encryption.
  • 27. © Waher Data AB, 2018. 4.1 Security HTTP / HTTPS
  • 28. © Waher Data AB, 2018. HTTP(S)  Standardized by IETF  Popular  Well known  Request/Response communication pattern  Web-socket  Bidirectional  Asynchronous  TLS transport encryption  Problems:  Topology  Middleware  Distributed/Global Identities  Difficult to make secure
  • 29. © Waher Data AB, 2018. Topology Problem  Actors  Client  Server  Server must be reachable by the client  Thing a server  Natural, from a conceptual perspective.  Sacrifices security: “hole punching”  Thing a client  Unnatural  Sacrifices privacy  Creates potential bottlenecks  Server or Middleware processing
  • 30. © Waher Data AB, 2018. Middleware  How can a client communicate with a client?  “Middle”-ware: Software in the middle of clients.  Acts as servers to both clients.  Proprietary solutions  Multitudes  Hybrid solutions  LWM2M (just data collection)  MQTT (proprietary HTTP bindings)  Standardized solutions  XMPP (BOSH or Web-socket bindings)
  • 31. © Waher Data AB, 2018. Scalability Problem  C10K problem  Difficulty in creating scalable middleware.  Vulnerability increases by scale  Alternative: Federated middleware  XMPP (standardized option)
  • 32. © Waher Data AB, 2018. Identity Problem  Authentication  Server typically manages accounts  Distributed identities difficult  Reversed original architecture  Difficult to make security decisions in a distributed environment. Server Client Client Client Client Client Server Server Server Server
  • 33. © Waher Data AB, 2018. 4.2 Security MQTT
  • 34. © Waher Data AB, 2018. MQTT  Standardized by OASIS  Popular  Most used protocol for IoT  Publish/Subscribe communication pattern  Efficiently distributes data to multiple subscribers  The broker solves the topology problem.  TLS Transport Encryption  Problems:  Multiple serious design-vulnerabilities  Scalability  Identities
  • 35. © Waher Data AB, 2018. Publish/Subscribe
  • 36. © Waher Data AB, 2018. Vulnerabilities by design 1(2)  No forwarded identities  Authorization becomes impossible by things  Makes injection a great threat  Control signals  False data  Bandwidth depletion  Lack of privacy  No negotiation of who can subscribe  Access control out-of-band (proprietary)  Wildcards  Makes it easy to eavesdrop  Scalability  Topic tree and number of devices have limits  No natural way to federate  How do you interoperate across domains?
  • 37. © Waher Data AB, 2018. Vulnerabilities by design 2(2)  Passwords in clear text*  Out-of-band (proprietary) authentication with client certificates required  Lack of content meta-data*  Impedes interoperability  Indeterministic  Cannot foresee the consequences of an operation  Relies on careful operation of broker  Overview of topic tree difficult  Who operates the broker across domains? (*) Partially solved if explicitly used in MQTT v5.
  • 38. © Waher Data AB, 2018. Warnings  Governments warn against bad MQTT implementations.  MQTT is notoriously difficult to use securely.  Use it only in internal secured networks. https://cert.se/2016/09/mqtt-i-sverige
  • 39. © Waher Data AB, 2018. 4.3 Security CoAP / CoAPS
  • 40. © Waher Data AB, 2018. CoAP(S)  Standardized by IETF  “Binary HTTP”  Resource-constrained networks  Resource-constrained devices  UDP  Solves C10K problem  Communication Patterns  Request Response  Event Subscription  Multi-casting  DTLS transport encryption  Not for multi-casting
  • 41. © Waher Data AB, 2018. Limitations  Still has topology problem  Assumes middleware for Internet use  LWM2M is standardized middleware  Some interoperability  IPSO Smart Objects  Only for data collection  Difficult to interoperate between things  Distributed identities still difficult.
  • 42. © Waher Data AB, 2018. 4.4 Security LWM2M
  • 43. © Waher Data AB, 2018. LWM2M  Standardized by OMA  IPSO Smart Objects  Adds security to CoAP Manages keys and authentication Bootstrapping Device Management Access Control Lists
  • 44. © Waher Data AB, 2018. 4.5 Security XMPP
  • 45. © Waher Data AB, 2018. XMPP  Standardized by IETF  Federated  Globally scalable  Extensible  XML namespaces  Open  Robust  Secure  Interoperable  Binding  Socket, HTTP, WebSocket
  • 46. © Waher Data AB, 2018. Communication  Brokers  Accounts  Rosters  Routing  Federation  Topology insensitive  Server-less  Peer-to-peer  Authentication  SASL  Encryption  TLS  E2E
  • 47. © Waher Data AB, 2018. Federated Brokers  Authenticate clients  SASL  Cooperate (federation)  Forward identities  Authorization  Roster  Presence  Subscription  Solve  Topology problem.  Latency problem.  Scalability problem.
  • 48. © Waher Data AB, 2018. Security Standard layers of security:  Global Identities (always forwarded)  Authentication (SASL)  Encryption (TLS)  Authorization (presence subscription)  Blocking  Spam reporting  Provisioning
  • 49. © Waher Data AB, 2018. Communication Patterns Intrinsic patterns:  Asynchronous messages (message)  Request/Response (iq)  Publish/Subscribe (presence) Extended  Publish/Subscribe (extended by XEP-0060, 0163)  Multicasting (extended by XEP-0045)
  • 50. © Waher Data AB, 2018. XMPP & Privacy Data protection by design & by default:  Decentralization  Ubiquitous encryption  Even end-to-end encryption  Global identities  Authenticated  Forwarded  Authorization  Consent-based negotiation
  • 51. © Waher Data AB, 2018. Communication Patterns (Flexibility) CoAP HTTP IoT.H. LW M2M MQTT XMPP Async. Msg. ✓ ✓ ✓ ✓ Req/Resp. ✓ ✓ ✓ ✓ ✓ Pub/Sub. ✓✓✓ ✓ ✓✓✓ Federation ✓ ✓ ✓ ✓ Broker ✓ ✓ ✓ Severless ✓ ✓ ✓ P2P7 ✓ ✓ 4 2 9 2 2 9
  • 52. © Waher Data AB, 2018. 4.6 Security Blockchain
  • 53. © Waher Data AB, 2018. Blockchain  Cryptographic Algorithms fixed  Has an implicit built-in expiration time  Lends itself to future frauds  Vulnerable in Heterogenous networks Requires constant hardware updates  Severe privacy issues  Energy inefficient
  • 54. © Waher Data AB, 2018. Blockchain & Privacy  Blocks cannot  be deleted on request after a given time … or ever  be corrected  Access is given to all or nothing  Public access has to be assumed  Hashes of personal information is still personal Blockchain is not suitable for personal information at all.
  • 55. © Waher Data AB, 2018. 5. Summary
  • 56. © Waher Data AB, 2018. Security Summary Block chain CoAP HTTP IoT.H. LW M2M MQTT XMPP Identities ✓ ✓ ✓ ✓ ✓ Authentication ✓ ✓ ✓ ✓ ✓ Authorization ✓ ✓ ✓ Encryption ✓ ✓ ✓ ✓ ✓ ✓ E2E ✓ ✓ Consent ✓ ✓ Decentralized ✓ ✓ ✓ ✓ By design ✓ ✓ ✓ Flexibility 4 2 9 2 2 9 Openness 8 15 15 24 12 7 15 11 21 20 41 19 10 32
  • 57. © Waher Data AB, 2018. 6. Openness + Security For Things
  • 58. © Waher Data AB, 2018. Strong Foundation Things are “stupid” and need help with:  Decision Support  Ownership  Owner consent  Lifecycle  Transfer of ownership  Decommissioning  Discovery  Interoperability  Data  Operations
  • 59. © Waher Data AB, 2018. IoT Harmonization (IEEE 1451-99)  Sensor Data  Control Operations  Localization (M2M, M2H)  Tokens for distributed transactions  Decision Support (for devices)  Provisioning (for owners)  Peer-to-Peer communication  End-to-end encryption  Concentrator/Bridge (“Thing of things”)  Discovery  Ownership  Clock Synchronization  Secure Account Creation  Legal Identities  Contracts  Automated provisioning  Economic feedback https://gitlab.com/IEEE-SA/XMPPI/IoT
  • 60. © Waher Data AB, 2018. Backbone  Efficiency  Interoperability  Global scalability  Bridges technologies vs
  • 61. © Waher Data AB, 2018. 7. Events
  • 62. © Waher Data AB, 2018. Smart City Lectures* 1. How to build a Smart City (Oct 4th) 2. Privacy in the Smart City (Oct 18th) 3. An Open and/or Secure Smart City (Oct 25th) 4. Harmonizing the Internet of Things (Nov 8th) 5. Introduction to Encryption (Nov 15th) 6. Earning by Sharing in the Smart City (Nov 22th) 7. … 8. … (*) Funded by Swedish Internet Fund.
  • 63. © Waher Data AB, 2018. Smart City Labs* 1. Sensors and actuators (Oct 10th) 2. Connect and chat with your device (Oct 17th) 3. Publishing data from your sensor (Oct 24th) 4. Publishing and discovering devices (Nov 7th) 5. Controlling actuators (Nov 14th) 6. Decision Support for your devices (Nov 21th) 7. … 8. … (*) Funded by Swedish Internet Fund.
  • 64. © Waher Data AB, 2018.  Raspberry Pi & Arduino  Sensors, Actuators, Controllers, Concentrators, Bridges  Protocols: MQTT, HTTP, CoAP, LWM2M, XMPP  Interoperability  Social Interaction  Decision Support  Product Lifecycle  IoT Service Platforms  IoT Harmonization  Security  Privacy Amazon Packt Microsoft Store Contact: https://waher.se/, https://littlesister.se/ Mastering Internet of Things
  • 65. © Waher Data AB, 2018. 8. Open Discussion Ownership? Privacy? Security? Surveillance? Interoperability? Cool stuff? Qué? Where’s the Money? Who pays? What could go wrong? Little Sister? Harmonization?