Upgrade to Pro — share decks privately, control downloads, hide ads and more …

GSMA Mobile 360 Series - IoT Security: Safeguar...

GSMA Mobile 360 Series - IoT Security: Safeguarding the Network

Arduino

May 29, 2019
Tweet

More Decks by Arduino

Other Decks in Technology

Transcript

  1. Gianluca Varisco, CISO Arduino GSMA Mobile 360 Series, 29/05/2019 IoT

    Security: Safeguarding the Network @gvarisco
  2. Hardware Nodes (Devices, Sensors) Constrained devices Require C/C++ firmware skills

    Effective Power Management depends on Firmware Gateways Remote connections, SSH Device management Radio / Networks Long range / Low Power Source: https://makezine.com/2017/06/27/state-boards- platforms-products-purposes-current-crop-microcontrollers- vies-attention/
  3. “Enable anyone to develop secure IoT applications by making complex

    technology simple to use” ARDUINO MISSION for IoT
  4. 9

  5. 10 WHAT ARDUINO PROVIDES Sensors Data + Device Interaction Automatic

    Code Generation Arduino Hardware Secure Cloud Connection Device Management OTA Updates Firmware Changes Business Logic Firmware Upload Certificate or Password Provisioning Dashboards Third Parties IoT SaaS Arduino IoT Cloud
  6. 12 Core to the future and success of IoT is

    the “security of things” Device Identity Anti-tampering Key Management Encrypted Transport and Data Confidentiality
  7. 14 Hardware Security ATECC508A/ATECC608A Cryptographic Co-Processor from Microchip Technology What

    we use it for? – Secure Hardware-Based Key Storage up to 16 keys, certificates or data – Hardware Support for Asymmetric Sign, Verify, Key Agreement ECDSA, ECDH, NIST P256 Elliptic Curve Support – Internal high-quality FIPS Random Number Generator (RNG)
  8. 15 Data encryption and secure authentication – All traffic to/from

    Arduino IoT Cloud is encrypted using Transport Layer Security (TLS) – Device authentication using X.509 certificates – Initial support for JSON Web Tokens (ECDSA P-256 SHA-256) in ArduinoECCX08 library – AES-128 (for LoRaWAN™), AES-CMAC for messages exchange, which includes encryption and integrity.
  9. 16 SECURITY RECAP – Hardware-based security – Devices’ provisioning –

    TLS certificates for authentication – Encrypted data transfer