SlideShare a Scribd company logo
LinuxCon
Tokyo, Japan 2016
Secure IoT Gateway
Jim Gallagher
Senior Technical Marketing Lead, MontaVista Software
Setting the Stage
• This presentation will
focus on developing
Secure Gateways (Edge
Computing &
Connectivity) in the IoT
Architecutre
• Primarily discussion will
be on Architecture,
Security, and
Maintainence features
Sensors
Gateway
Cloud/Database & Analytics
Applications
L
i
n
u
x
Agenda
Architecture
Connectivity
Security
Maintainability
Summary and Q&A
Architecture:
Modern vs Wild West
Architecture choices
Embedded processor
considerations:
– Processor family
• ARM
• Intel x86
• PowerPC and MIPS possible
but not as popular
– Power consumption
• ARM: low power, advanced
PM features
• Intel x86: limited PM options
Architecture choices (ctd)
Embedded processor considerations:
– Performance
• ARM: Good core performance on lower Ghz
• Intel x86: ”Add Ghz -> more perf”
– Optimizations
• Security offload
• Virtualization
– Deployment model
• SOC model vs. ”generic compute”
• Longevity?
Ecosystem
 Intel vs. ARM really
• PPC and MIPS thin and fading ecosystem
• Ubuntu, Fedora, Debian, OpenSUSE, MontaVista,
WindRiver, and Enea all have/will have x86 and
ARM support for mainstream distros
• LINARO (ARM lead)
 Yocto project (Intel lead)
• Consolidate embedded development on
OE/bitbake
Connectivity
Sensors, Sensors everywhere!
 Simple sensor data drives
the IoT engine
• Fitness trackers, heart
monitors, oil and pressure
temperature gauges, &
packet latency in SDN
Gateway
L
i
n
u
x
 What connects them
• Wireless: Bluetooth, Wi-fi,
Cellular Modem, (3G/4G/5G),
Zigbee, & 6loPAN
• The bus lineup: Canbus,
Profibus, & Modbus
• Serial, SPI, I2C
• Near Field Communication (NFC)
• Prioprietary
 Implications
• Selected architecture must
support (directly or
USB/PCI) ALL
• Drivers as well...possible
port from different
architecture
• Enough performance
• Maintain versions
• Brace for the new
To the Cloud
 Data from sensors is the lifeblood of IoT
• Connects to cloud or database
• Gateways can filter/preprocess data
• Push must be secure (encrypted and
authenticated)
• Connectivity is bi-redirectional so IoT Gateway
must be secure from the cloud
 IoTivity
 Community framework to connect end devices
 Alljoyn Open Source Framework
 Connect and communicate across transports/OSes
Security
Recent Real-World Examples
• DHS confirms Public Sector Control system hacked
– Attacking inadequate perimeter security, an attacker could compromise the SCADA
system with capability to inject commands and read data at will
– The controlled device was brought down for maintenance so no damage done
• Boeing and Airbus
– Hacker used in-flight Wi-Fi connection to hack into flight control systems
– Allegedly controlled thrust for engines, oxygen mask deployment, etc.
• Drones
– Johns Hopkins University research demonstrated 3 different ways to send unwanted
commands
– Could force drones to land or just crash
• Personal vehicles
– Jeep hacked through navigation and Corvette hacked by SMS
– Activate wipers, apply brakes, disable engine & brakes
Design Considerations
• Building security primarily in
the Gateway?
– Edge devices are
constrained on hardened
channel
– Requires encryption for the
channel and two-way
authentication for setup
• Trusted edge vs. Edge
Computing - two polars?
– Moving computing to the
edge can help build end-to-
end efficiency, but requires
edge and gateway devices
to handle the security
– Can also be seen as a way
to fence out security threats
for some layers of the
processing so they cannot
be exploited from the Cloud
• Lifecycle: secure
firmware updates and
CVEs
– The Edge is relying on
the IT-supported backend
to handle the updates,
requires careful
consideration for the
technology and process
• Provide monitoring for
end-to-end data on the
Gateway
– Using DPI for heuristics-
based detection of
exploits
• Combining types of
security: physical,
networking, system
integrity and isolation of
domains
Architectural Functional
IoT Platform Virtualization & Security
vTPM
Guest VM
Container
Openflow DPDK
LXC/Docker
KVM
EMBEDDED LINUX
SELinux / sVirt
Application
Application
Hardware Platform
LXC/Docker
Application
3rd Party
Container
Monitoring / Auditing
Bootloader
TPM (x86)
Root
of
Trust
CVEFixes
and-Maintenance
Network
Security
- IPSec HW offload
- Policy
Configuration
Live Patching
Policy
Configuration
based on System
Requirements
TrustZone (ARM)
DPDK
FIPS
Types of Security Measures
• Reactive Measures
– Common Vulnerabilities and Exposures (CVEs)
• https://cve.mitre.org/
• The standard list for holes in common systems
• Very important to cover the affected parts in your product; MontaVista will do this for you
– Intrusion-detection systems
• Take action based on perceived attack
• Several systems exist for Linux (LIDS, auditd, inotify, tripwire..)
– Auditing and logging
• Knowing you’ve been attacked prevents further damage
• Collect evidence for litigation against the attacker
• Example tools: Auditd, syslog, inotify, SELinux..
• Proactive Measures
– Mandatory Access Control (MAC)
• Minimizes the damage that unknown exploits can do to your system
• Increases the chances to block 0-day exploits (unknown vulnerabilities)
– System Certification
• Provide Common Criteria or similar
certification for your product or platform
• MontaVista’s Linux is certifiable and we can help with
the process
– Root of Trust
• Full featured and lightweight virtualization solutions
Embedded Linux
Container
Core
Isolation
Application
LXC/Docker
Container
Application
KVM
Application
OS
Guest VM
 KVM
Full virtualization
 Docker
Application containers
 LXC
Full-system
Containers
 Core Isolation
Dataplane and
RT applications
Virtualization Technology for Isolation
• Make Security a Priority
• Implement Mixture
– Reactive
– Proactive
• Stay Current
Maintenance
IoT Maintainability Requirements
• Product life cycle support
• Ability to upgrade application, kernel,
drivers, userland, or whole system
• Upgrades done with little to no “human”
interaction and downtime
– Wireless delivery
• Secure updates
– Authentication
– Encryption
Addressing IoT Maintenance with Linux
• Long Term Support (LTS) Kernel
– Can be extended beyond 10+ years in
commercial Linux distributions
• SMART package manager
– Allows for source or binary distribution
– Flexible to update userland, application, etc.
• Live kernel patching
• Crypto API support
• Trusted Platform Module (TPM) and
TrustZone for secure OTA updates
IoT: Signed OTA Updates
• IoT devices and Gateways have embedded requirements for small footprint but still a
very high demand for security
• The process relies on the Kernel Live Patches, RPMs, or Container images being
hashed and signed by a certificate that can be validated by the TPM or TEE on the
target system if necessary
– Can also support two-way signatures by using standard RPM signing using GPG
keys, potentially enforced by the server-side TPM.
• Such processes are adopted by OSVs like Symantec, Redbend and practically all
product manufacturers that are concerned about running trusted/secure SW on the
devices.
• Without secure updates, the integrity of the platform cannot be maintained.
ServerDevice
Decrypt and
verify signature
Update
Data
Generate, Sign and Encrypt
Host OS
Update
Data
Pubkey-
TPM
SecKey-
Host
PubKey-
Host
SecKey-
TPM
Deliver update
• RPM / deb / IPK
• Docker, VM image
• Kernel (Live) Patch
TPM
TPM/TEE
SDK
Linux
Linux
Summary
• Embedded Linux
offers solid software
platform to IoT
Gateway developers
– Architecture
– Connectivity
• Security is
IMPORTANT to
implement
• High uptime
maintainability
Thank You
Questions/Discussion
jgallagher@mvista.com
Ad

More Related Content

What's hot (20)

MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
vtunotesbysree
 
IoT Security
IoT SecurityIoT Security
IoT Security
Narudom Roongsiriwong, CISSP
 
Elgamal_digital_signature_scheme.pptx
Elgamal_digital_signature_scheme.pptxElgamal_digital_signature_scheme.pptx
Elgamal_digital_signature_scheme.pptx
Karim Monir
 
IPv6 Transition Strategies
IPv6 Transition StrategiesIPv6 Transition Strategies
IPv6 Transition Strategies
APNIC
 
nptel-1.pdf
nptel-1.pdfnptel-1.pdf
nptel-1.pdf
Ragesh Warrier
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
Phannarith Ou, G-CISO
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Ameer Sameer
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
Shailesh Pachori
 
Building Blocks for IoT Devices
Building Blocks for IoT DevicesBuilding Blocks for IoT Devices
Building Blocks for IoT Devices
Anil Gorthy
 
Internet of Things changing our lives
Internet of Things changing our livesInternet of Things changing our lives
Internet of Things changing our lives
ABHILASHGUPTAKONIJET
 
BGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
BGP Path Selection & Attributes BGP Weight & BGP AS-Path PrependingBGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
BGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
Shawan Roy
 
When IoT Meets Artificial Intelligence
 When IoT Meets Artificial Intelligence When IoT Meets Artificial Intelligence
When IoT Meets Artificial Intelligence
Veselin Pizurica
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
Tharindu Kumara
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide Ethernet
Rockwell Automation
 
IoT Reference Architecture and Case Studies
IoT Reference Architecture and Case StudiesIoT Reference Architecture and Case Studies
IoT Reference Architecture and Case Studies
Serhiy (Serge) Haziyev
 
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
Edureka!
 
iot seminar topic
iot seminar topic iot seminar topic
iot seminar topic
Kuldeep Suthar
 
IPv6 next generation protocol
IPv6 next generation protocolIPv6 next generation protocol
IPv6 next generation protocol
Rupshanker Mishra
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
Hamdamboy (함담보이)
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
vtunotesbysree
 
Elgamal_digital_signature_scheme.pptx
Elgamal_digital_signature_scheme.pptxElgamal_digital_signature_scheme.pptx
Elgamal_digital_signature_scheme.pptx
Karim Monir
 
IPv6 Transition Strategies
IPv6 Transition StrategiesIPv6 Transition Strategies
IPv6 Transition Strategies
APNIC
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Ameer Sameer
 
Building Blocks for IoT Devices
Building Blocks for IoT DevicesBuilding Blocks for IoT Devices
Building Blocks for IoT Devices
Anil Gorthy
 
Internet of Things changing our lives
Internet of Things changing our livesInternet of Things changing our lives
Internet of Things changing our lives
ABHILASHGUPTAKONIJET
 
BGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
BGP Path Selection & Attributes BGP Weight & BGP AS-Path PrependingBGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
BGP Path Selection & Attributes BGP Weight & BGP AS-Path Prepending
Shawan Roy
 
When IoT Meets Artificial Intelligence
 When IoT Meets Artificial Intelligence When IoT Meets Artificial Intelligence
When IoT Meets Artificial Intelligence
Veselin Pizurica
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide Ethernet
Rockwell Automation
 
IoT Reference Architecture and Case Studies
IoT Reference Architecture and Case StudiesIoT Reference Architecture and Case Studies
IoT Reference Architecture and Case Studies
Serhiy (Serge) Haziyev
 
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
IoT Tutorial for Beginners | Internet of Things (IoT) | IoT Training | IoT Te...
Edureka!
 
IPv6 next generation protocol
IPv6 next generation protocolIPv6 next generation protocol
IPv6 next generation protocol
Rupshanker Mishra
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
Hamdamboy (함담보이)
 

Viewers also liked (6)

Using open source for IoT
Using open source for IoTUsing open source for IoT
Using open source for IoT
Ian Skerrett
 
Iot gateways march 2015
Iot gateways march 2015Iot gateways march 2015
Iot gateways march 2015
sgadgil2002
 
Open source IoT gateway
Open source IoT gatewayOpen source IoT gateway
Open source IoT gateway
Henryk Konsek
 
Simplify Internet of Things with an Intelligent Gateway
Simplify Internet of Things with an Intelligent GatewaySimplify Internet of Things with an Intelligent Gateway
Simplify Internet of Things with an Intelligent Gateway
Eurotech
 
Internet of Things - Advantech IoT Gateway Starter Kit
Internet of Things - Advantech IoT Gateway Starter KitInternet of Things - Advantech IoT Gateway Starter Kit
Internet of Things - Advantech IoT Gateway Starter Kit
Advantech Europe E-IOT Business Group
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
Eurotech
 
Using open source for IoT
Using open source for IoTUsing open source for IoT
Using open source for IoT
Ian Skerrett
 
Iot gateways march 2015
Iot gateways march 2015Iot gateways march 2015
Iot gateways march 2015
sgadgil2002
 
Open source IoT gateway
Open source IoT gatewayOpen source IoT gateway
Open source IoT gateway
Henryk Konsek
 
Simplify Internet of Things with an Intelligent Gateway
Simplify Internet of Things with an Intelligent GatewaySimplify Internet of Things with an Intelligent Gateway
Simplify Internet of Things with an Intelligent Gateway
Eurotech
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
Eurotech
 
Ad

Similar to Secure IOT Gateway (20)

Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device
ICS
 
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
TM4C-IoT-Gateway-with-Security-Protection_0.pdfTM4C-IoT-Gateway-with-Security-Protection_0.pdf
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
ssuser8b324e
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
Srinivasa Addepalli
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
Rick G. Garibay
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
OWASP Delhi
 
Ch 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden ThreatCh 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden Threat
Sam Bowne
 
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueIndustrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Eurotech
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
RISC-V International
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
Eurotech
 
Is your MQTT broker IoT ready?
Is your MQTT broker IoT ready?Is your MQTT broker IoT ready?
Is your MQTT broker IoT ready?
Eurotech
 
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
sequi_inc
 
Java in the Air: A Case Study for Java-based Environment Monitoring Stations
Java in the Air: A Case Study for Java-based Environment Monitoring StationsJava in the Air: A Case Study for Java-based Environment Monitoring Stations
Java in the Air: A Case Study for Java-based Environment Monitoring Stations
Eurotech
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
 
Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013
Dorian Hernandez
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine Learning
VEDLIoT Project
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
Aymeric Weinbach
 
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case StudyCisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
nicholas njoroge
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device
ICS
 
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
TM4C-IoT-Gateway-with-Security-Protection_0.pdfTM4C-IoT-Gateway-with-Security-Protection_0.pdf
TM4C-IoT-Gateway-with-Security-Protection_0.pdf
ssuser8b324e
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
Srinivasa Addepalli
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
Rick G. Garibay
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
OWASP Delhi
 
Ch 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden ThreatCh 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden Threat
Sam Bowne
 
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the RescueIndustrial IoT Mayhem? Java IoT Gateways to the Rescue
Industrial IoT Mayhem? Java IoT Gateways to the Rescue
Eurotech
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
RISC-V International
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
Eurotech
 
Is your MQTT broker IoT ready?
Is your MQTT broker IoT ready?Is your MQTT broker IoT ready?
Is your MQTT broker IoT ready?
Eurotech
 
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
sequi_inc
 
Java in the Air: A Case Study for Java-based Environment Monitoring Stations
Java in the Air: A Case Study for Java-based Environment Monitoring StationsJava in the Air: A Case Study for Java-based Environment Monitoring Stations
Java in the Air: A Case Study for Java-based Environment Monitoring Stations
Eurotech
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
 
Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013Distributech_Presentation DTECH_2013
Distributech_Presentation DTECH_2013
Dorian Hernandez
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine Learning
VEDLIoT Project
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
Aymeric Weinbach
 
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case StudyCisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
nicholas njoroge
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
Ad

More from LF Events (16)

Feature rich BTRFS is Getting Richer with Encryption
Feature rich BTRFS is Getting Richer with EncryptionFeature rich BTRFS is Getting Richer with Encryption
Feature rich BTRFS is Getting Richer with Encryption
LF Events
 
KASan in a Bare-Metal Hypervisor
 KASan in a Bare-Metal Hypervisor  KASan in a Bare-Metal Hypervisor
KASan in a Bare-Metal Hypervisor
LF Events
 
Efficient kernel backporting
Efficient kernel backportingEfficient kernel backporting
Efficient kernel backporting
LF Events
 
Raspberry pi Update - Encourage your IOT
Raspberry pi Update - Encourage your IOTRaspberry pi Update - Encourage your IOT
Raspberry pi Update - Encourage your IOT
LF Events
 
Introduction to Open-O
Introduction to Open-OIntroduction to Open-O
Introduction to Open-O
LF Events
 
CNCF and Fujitsu
CNCF and FujitsuCNCF and Fujitsu
CNCF and Fujitsu
LF Events
 
SR-IOV ixgbe Driver Limitations and Improvement
SR-IOV ixgbe Driver Limitations and ImprovementSR-IOV ixgbe Driver Limitations and Improvement
SR-IOV ixgbe Driver Limitations and Improvement
LF Events
 
NVMe Over Fabrics Support in Linux
NVMe Over Fabrics Support in LinuxNVMe Over Fabrics Support in Linux
NVMe Over Fabrics Support in Linux
LF Events
 
Linxu conj2016 96boards
Linxu conj2016 96boardsLinxu conj2016 96boards
Linxu conj2016 96boards
LF Events
 
Taking over to the Next Generation
Taking over to the Next GenerationTaking over to the Next Generation
Taking over to the Next Generation
LF Events
 
Learning From Real Practice of Providing Highly Available Hybrid Cloud Servic...
Learning From Real Practice of Providing Highly Available Hybrid Cloud Servic...Learning From Real Practice of Providing Highly Available Hybrid Cloud Servic...
Learning From Real Practice of Providing Highly Available Hybrid Cloud Servic...
LF Events
 
Generating a Reproducible and Maintainable Embedded Linux Environment with Po...
Generating a Reproducible and Maintainable Embedded Linux Environment with Po...Generating a Reproducible and Maintainable Embedded Linux Environment with Po...
Generating a Reproducible and Maintainable Embedded Linux Environment with Po...
LF Events
 
Trading Derivatives on Hyperledger
Trading Derivatives on HyperledgerTrading Derivatives on Hyperledger
Trading Derivatives on Hyperledger
LF Events
 
Introducing Oracle Linux and Securing It With ksplice
Introducing Oracle Linux and Securing It With kspliceIntroducing Oracle Linux and Securing It With ksplice
Introducing Oracle Linux and Securing It With ksplice
LF Events
 
Boost UDP Transaction Performance
Boost UDP Transaction PerformanceBoost UDP Transaction Performance
Boost UDP Transaction Performance
LF Events
 
Containers: Don't Skeu Them Up, Use Microservices Instead
Containers: Don't Skeu Them Up, Use Microservices InsteadContainers: Don't Skeu Them Up, Use Microservices Instead
Containers: Don't Skeu Them Up, Use Microservices Instead
LF Events
 
Feature rich BTRFS is Getting Richer with Encryption
Feature rich BTRFS is Getting Richer with EncryptionFeature rich BTRFS is Getting Richer with Encryption
Feature rich BTRFS is Getting Richer with Encryption
LF Events
 
KASan in a Bare-Metal Hypervisor
 KASan in a Bare-Metal Hypervisor  KASan in a Bare-Metal Hypervisor
KASan in a Bare-Metal Hypervisor
LF Events
 
Efficient kernel backporting
Efficient kernel backportingEfficient kernel backporting
Efficient kernel backporting
LF Events
 
Raspberry pi Update - Encourage your IOT
Raspberry pi Update - Encourage your IOTRaspberry pi Update - Encourage your IOT
Raspberry pi Update - Encourage your IOT
LF Events
 
Introduction to Open-O
Introduction to Open-OIntroduction to Open-O
Introduction to Open-O
LF Events
 
CNCF and Fujitsu
CNCF and FujitsuCNCF and Fujitsu
CNCF and Fujitsu
LF Events
 
SR-IOV ixgbe Driver Limitations and Improvement
SR-IOV ixgbe Driver Limitations and ImprovementSR-IOV ixgbe Driver Limitations and Improvement
SR-IOV ixgbe Driver Limitations and Improvement
LF Events
 
NVMe Over Fabrics Support in Linux
NVMe Over Fabrics Support in LinuxNVMe Over Fabrics Support in Linux
NVMe Over Fabrics Support in Linux
LF Events
 
Linxu conj2016 96boards
Linxu conj2016 96boardsLinxu conj2016 96boards
Linxu conj2016 96boards
LF Events
 
Taking over to the Next Generation
Taking over to the Next GenerationTaking over to the Next Generation
Taking over to the Next Generation
LF Events
 
Learning From Real Practice of Providing Highly Available Hybrid Cloud Servic...
Learning From Real Practice of Providing Highly Available Hybrid Cloud Servic...Learning From Real Practice of Providing Highly Available Hybrid Cloud Servic...
Learning From Real Practice of Providing Highly Available Hybrid Cloud Servic...
LF Events
 
Generating a Reproducible and Maintainable Embedded Linux Environment with Po...
Generating a Reproducible and Maintainable Embedded Linux Environment with Po...Generating a Reproducible and Maintainable Embedded Linux Environment with Po...
Generating a Reproducible and Maintainable Embedded Linux Environment with Po...
LF Events
 
Trading Derivatives on Hyperledger
Trading Derivatives on HyperledgerTrading Derivatives on Hyperledger
Trading Derivatives on Hyperledger
LF Events
 
Introducing Oracle Linux and Securing It With ksplice
Introducing Oracle Linux and Securing It With kspliceIntroducing Oracle Linux and Securing It With ksplice
Introducing Oracle Linux and Securing It With ksplice
LF Events
 
Boost UDP Transaction Performance
Boost UDP Transaction PerformanceBoost UDP Transaction Performance
Boost UDP Transaction Performance
LF Events
 
Containers: Don't Skeu Them Up, Use Microservices Instead
Containers: Don't Skeu Them Up, Use Microservices InsteadContainers: Don't Skeu Them Up, Use Microservices Instead
Containers: Don't Skeu Them Up, Use Microservices Instead
LF Events
 

Recently uploaded (20)

Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 

Secure IOT Gateway

  • 1. LinuxCon Tokyo, Japan 2016 Secure IoT Gateway Jim Gallagher Senior Technical Marketing Lead, MontaVista Software
  • 2. Setting the Stage • This presentation will focus on developing Secure Gateways (Edge Computing & Connectivity) in the IoT Architecutre • Primarily discussion will be on Architecture, Security, and Maintainence features Sensors Gateway Cloud/Database & Analytics Applications L i n u x
  • 5. Architecture choices Embedded processor considerations: – Processor family • ARM • Intel x86 • PowerPC and MIPS possible but not as popular – Power consumption • ARM: low power, advanced PM features • Intel x86: limited PM options
  • 6. Architecture choices (ctd) Embedded processor considerations: – Performance • ARM: Good core performance on lower Ghz • Intel x86: ”Add Ghz -> more perf” – Optimizations • Security offload • Virtualization – Deployment model • SOC model vs. ”generic compute” • Longevity?
  • 7. Ecosystem  Intel vs. ARM really • PPC and MIPS thin and fading ecosystem • Ubuntu, Fedora, Debian, OpenSUSE, MontaVista, WindRiver, and Enea all have/will have x86 and ARM support for mainstream distros • LINARO (ARM lead)  Yocto project (Intel lead) • Consolidate embedded development on OE/bitbake
  • 9. Sensors, Sensors everywhere!  Simple sensor data drives the IoT engine • Fitness trackers, heart monitors, oil and pressure temperature gauges, & packet latency in SDN Gateway L i n u x  What connects them • Wireless: Bluetooth, Wi-fi, Cellular Modem, (3G/4G/5G), Zigbee, & 6loPAN • The bus lineup: Canbus, Profibus, & Modbus • Serial, SPI, I2C • Near Field Communication (NFC) • Prioprietary  Implications • Selected architecture must support (directly or USB/PCI) ALL • Drivers as well...possible port from different architecture • Enough performance • Maintain versions • Brace for the new
  • 10. To the Cloud  Data from sensors is the lifeblood of IoT • Connects to cloud or database • Gateways can filter/preprocess data • Push must be secure (encrypted and authenticated) • Connectivity is bi-redirectional so IoT Gateway must be secure from the cloud  IoTivity  Community framework to connect end devices  Alljoyn Open Source Framework  Connect and communicate across transports/OSes
  • 12. Recent Real-World Examples • DHS confirms Public Sector Control system hacked – Attacking inadequate perimeter security, an attacker could compromise the SCADA system with capability to inject commands and read data at will – The controlled device was brought down for maintenance so no damage done • Boeing and Airbus – Hacker used in-flight Wi-Fi connection to hack into flight control systems – Allegedly controlled thrust for engines, oxygen mask deployment, etc. • Drones – Johns Hopkins University research demonstrated 3 different ways to send unwanted commands – Could force drones to land or just crash • Personal vehicles – Jeep hacked through navigation and Corvette hacked by SMS – Activate wipers, apply brakes, disable engine & brakes
  • 13. Design Considerations • Building security primarily in the Gateway? – Edge devices are constrained on hardened channel – Requires encryption for the channel and two-way authentication for setup • Trusted edge vs. Edge Computing - two polars? – Moving computing to the edge can help build end-to- end efficiency, but requires edge and gateway devices to handle the security – Can also be seen as a way to fence out security threats for some layers of the processing so they cannot be exploited from the Cloud • Lifecycle: secure firmware updates and CVEs – The Edge is relying on the IT-supported backend to handle the updates, requires careful consideration for the technology and process • Provide monitoring for end-to-end data on the Gateway – Using DPI for heuristics- based detection of exploits • Combining types of security: physical, networking, system integrity and isolation of domains Architectural Functional
  • 14. IoT Platform Virtualization & Security vTPM Guest VM Container Openflow DPDK LXC/Docker KVM EMBEDDED LINUX SELinux / sVirt Application Application Hardware Platform LXC/Docker Application 3rd Party Container Monitoring / Auditing Bootloader TPM (x86) Root of Trust CVEFixes and-Maintenance Network Security - IPSec HW offload - Policy Configuration Live Patching Policy Configuration based on System Requirements TrustZone (ARM) DPDK FIPS
  • 15. Types of Security Measures • Reactive Measures – Common Vulnerabilities and Exposures (CVEs) • https://cve.mitre.org/ • The standard list for holes in common systems • Very important to cover the affected parts in your product; MontaVista will do this for you – Intrusion-detection systems • Take action based on perceived attack • Several systems exist for Linux (LIDS, auditd, inotify, tripwire..) – Auditing and logging • Knowing you’ve been attacked prevents further damage • Collect evidence for litigation against the attacker • Example tools: Auditd, syslog, inotify, SELinux.. • Proactive Measures – Mandatory Access Control (MAC) • Minimizes the damage that unknown exploits can do to your system • Increases the chances to block 0-day exploits (unknown vulnerabilities) – System Certification • Provide Common Criteria or similar certification for your product or platform • MontaVista’s Linux is certifiable and we can help with the process – Root of Trust
  • 16. • Full featured and lightweight virtualization solutions Embedded Linux Container Core Isolation Application LXC/Docker Container Application KVM Application OS Guest VM  KVM Full virtualization  Docker Application containers  LXC Full-system Containers  Core Isolation Dataplane and RT applications Virtualization Technology for Isolation
  • 17. • Make Security a Priority • Implement Mixture – Reactive – Proactive • Stay Current
  • 19. IoT Maintainability Requirements • Product life cycle support • Ability to upgrade application, kernel, drivers, userland, or whole system • Upgrades done with little to no “human” interaction and downtime – Wireless delivery • Secure updates – Authentication – Encryption
  • 20. Addressing IoT Maintenance with Linux • Long Term Support (LTS) Kernel – Can be extended beyond 10+ years in commercial Linux distributions • SMART package manager – Allows for source or binary distribution – Flexible to update userland, application, etc. • Live kernel patching • Crypto API support • Trusted Platform Module (TPM) and TrustZone for secure OTA updates
  • 21. IoT: Signed OTA Updates • IoT devices and Gateways have embedded requirements for small footprint but still a very high demand for security • The process relies on the Kernel Live Patches, RPMs, or Container images being hashed and signed by a certificate that can be validated by the TPM or TEE on the target system if necessary – Can also support two-way signatures by using standard RPM signing using GPG keys, potentially enforced by the server-side TPM. • Such processes are adopted by OSVs like Symantec, Redbend and practically all product manufacturers that are concerned about running trusted/secure SW on the devices. • Without secure updates, the integrity of the platform cannot be maintained. ServerDevice Decrypt and verify signature Update Data Generate, Sign and Encrypt Host OS Update Data Pubkey- TPM SecKey- Host PubKey- Host SecKey- TPM Deliver update • RPM / deb / IPK • Docker, VM image • Kernel (Live) Patch TPM TPM/TEE SDK Linux Linux
  • 22. Summary • Embedded Linux offers solid software platform to IoT Gateway developers – Architecture – Connectivity • Security is IMPORTANT to implement • High uptime maintainability