![Page 1: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/1.jpg)
Will Internet of Things be Secure Enough ? https://www.youtube.com/user/dastikop
Ravindra Dastikophttp://dastikop.blogspot.in
![Page 2: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/2.jpg)
Internet of Things A new World of CONNECTED Objects
![Page 3: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/3.jpg)
IoT SESSIONS
Session 1 Web Architecture for an Internet of Things
Session 2Will IoT be Secure Enough?
Session 3 Applications of IoT
Session 4 Research Directions in IoT
![Page 4: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/4.jpg)
Will IoT be secure enough?
Session 2
![Page 5: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/5.jpg)
ISSUE
• Privacy and Security are major
challenge in building IoT ecosystem
• They are source of friction on the
path to adoption.
![Page 6: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/6.jpg)
AGENDA
• The IoT World Described
• The Security Architecture
• layers
• challenge
• solutions
• Conclusion
![Page 7: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/7.jpg)
IoT Described
The main concept of IoT is the ability to
connect loosely defined smart objects and
enable them to interact with
• other objects,
• the environment, or
• more complex and legacy computing
devices
![Page 8: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/8.jpg)
IOT: Communication Infrastructure
The communication infrastructure will be
based on an extension of the Internet,
which will enable transparent use of object
resources across the globe.
![Page 9: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/9.jpg)
An IOT enabled worldSmart objects will densely populate human life and
human environment, interacting both by providing ,
processing and delivering any sort of information or
command
objects in the environment will be able to tell us about
themselves, their state, or their surroundings and
can be used remotely
![Page 10: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/10.jpg)
An IOT enabled worldSensors will be integrated in buildings,
vehicles, and common environments, carried
by people and attached to animals and will
communicate among them locally and
remotely in order to provide integrated
services.
![Page 11: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/11.jpg)
IoT : Examples
• Mobile devices can adopt silent mode when entering a
meeting room if this is the request of the meeting
moderator
• Alert user and turn-off the radio before entering sensitive
medical areas or
• detect when user enters the car and connect to its sound
systems
• Wireless sensors could let people check where their pet is
real-time as well as control the temperature of each room
of their home while they are out
![Page 12: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/12.jpg)
IoT : Examples• Emergency services could be remotely and
automatically altered if fire is detected in a
building or if a patient’s medical parameters
drop beyond a critical threshold
![Page 13: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/13.jpg)
The Consequence With such a deep penetration of technology
which will introduce a new kind of
automation and remote interaction, it will
surely pose new security and privacy
challenges.
![Page 14: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/14.jpg)
Security in IoT
1. In IoT security is inseparable from safety
2. Whether accidental or malicious,
interference in the controls of
1. a pacemaker, or
2. a car or nuclear reactor poses a threat
to life.
![Page 15: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/15.jpg)
The Interaction Time
You may Pose Questions Now
![Page 16: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/16.jpg)
The Security Architecture
![Page 17: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/17.jpg)
Security architecture
Reference: Security in the Internet of Things: A Review
![Page 18: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/18.jpg)
Perceptual Layer • The most basic level is the perceptual layer (also known
as recognition layer), which collects all kinds of
information through physical equipment and identifies
the physical world, the information includes object
properties, environmental condition etc; and physical
equipments include RFID reader, all kinds of sensors, GPS
and other equipments.
• The key component in this layer is sensors for capturing
and representing the physical world in the digital world.
![Page 19: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/19.jpg)
Network Layer• The second level is network layer. Network layer is
responsible for the reliable transmission of information
from perceptual layer, initial processing of information,
classification and polymerization.
• In this layer the information transmission is relied on
several basic networks, which are the internet, mobile
communication network, satellite nets, wireless network,
network infrastructure and communication protocols are
also essential to the information exchange between devices
![Page 20: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/20.jpg)
Support Layer• The third level is support layer. Support layer will set
up a reliable support platform for the application
layer.
• On this support platform all kind of intelligent
computing powers will be organized through network
grid and cloud computing.
• It plays the role of combining application layer upward
and network layer downward.
![Page 21: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/21.jpg)
Application Layer• The application layer is the topmost and terminal
level.
• Application layer provides the personalized services
according to the needs of the users.
• Users can access to the internet of thing through the
application layer interface using of television, personal
computer or mobile equipment and so on.
![Page 22: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/22.jpg)
Security architecture
Reference: Security in the Internet of Things: A Review
![Page 23: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/23.jpg)
The Interaction Time
You may Pose Questions Now
![Page 24: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/24.jpg)
The Security Architecture
Challenges
![Page 25: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/25.jpg)
Perceptual Layer
• Usually perceptual nodes are short of computer power and
storage capacity because they are simple and with less power.
• Therefore it is unable to apply frequency hopping communication
and public key encryption algorithm to security protection.
• And it is very difficult to set up security protection system.
• Meanwhile attacks from the external network such as deny of
service (DOS) also bring new security problems.
• on the other hand sensor data still need the protection for
integrity, authenticity and confidentiality.
![Page 26: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/26.jpg)
Network Layer• The core network has relatively completely safety
protection ability,
• But Man-in-the-Middle Attack and counterfeit attack
still exist,
• meanwhile junk mail and computer virus cannot be
ignored, a large number of data sending cause
congestion.
Therefore security mechanism in this level is very
important to the IoT.
![Page 27: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/27.jpg)
Support Layer
This layer does the mass data processing and
intelligent decision of network behavior in
this layer, intelligent processing is limited for
malicious information, so it is a challenge to
improve the ability to recognize the
malicious information.
![Page 28: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/28.jpg)
Application Layer• In this level security needs for different
application environment are different,
• data sharing is that one of the
characteristics of application layer,
• which creating problems of data privacy,
access control and disclosure of
information.
![Page 29: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/29.jpg)
The Security Architecture
Requirements
![Page 30: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/30.jpg)
Security requirements in each level
![Page 31: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/31.jpg)
Perceptual Layer-1• At first node authentication is necessary to
prevent illegal node access;
• secondly to protect the confidentiality of
information transmission between the
nodes, data encryption is absolute
necessity;
![Page 32: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/32.jpg)
Perceptual Layer-1• The data encryption key agreement is an important
process in advance; the stronger are the safety
measures, the more is consumption of resources, to
solve this problem, lightweight encryption technology
becomes important, which includes Lightweight
cryptographic algorithm and lightweight cryptographic
protocol.
• At the same time the integrity and authenticity of
sensor data is becoming research focus.
![Page 33: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/33.jpg)
Network Layer-1• In this layer existing communication security
mechanisms are difficult to be applied.
• Identity authentication is a kind of
mechanism to prevent the illegal nodes, and it
is the premise of the security mechanism,
confidentiality and integrality are of equal
importance, thus we also need to establish
data confidentiality and integrality
mechanism.
![Page 34: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/34.jpg)
Network Layer-2Besides distributed denial of service attack
(DDoS) is a common attack method in the
network and is particularly severe in the
internet of thing, so to prevent the DDOS
attack for the vulnerable node is another
problem to be solved in this layer.
![Page 35: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/35.jpg)
Support Layer• Support layer needs a lot of the application
security architecture such as cloud
computing and
• secure multiparty computation, almost
all of the strong encryption algorithm and
encryption protocol, stronger system
security technology and anti-virus.
![Page 36: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/36.jpg)
Application LayerTo solve the security problem of application layer, we need
two aspects.
• One is the authentication and key agreement across
the heterogeneous network,
• the other is user’s privacy protection.
• In addition, education and management are very
important to information security, especially password
management
![Page 37: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/37.jpg)
The Importance of IoT Security
• In summary security technology in the IoT is
very important and full of challenges.
• On the other hand laws and regulations
issues are also significant.
![Page 38: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/38.jpg)
IOT Security Scenarios- 11. In a factory floor automation, deeply embedded
programmable logic controllers (PLCs) that
operate robotic systems are typically integrated
with the enterprise IT infrastructure
2. How can those PLCs be shielded from human
interferences while at the same time
protecting the investments in the IT
infrastructure and leveraging the security
controls available
![Page 39: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/39.jpg)
IOT Security Scenario-2 1. Control systems for nuclear reactors are
attached to infrastructure.
2. How can they receive software updates or
security patches in a timely manner
without impairing functional safety or
incurring significant recertification costs
every time a patch is rolled out
![Page 40: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/40.jpg)
IOT Security Scenarios- 3 1. A smart meter – one which is able to send energy
usage data to the utility operator for dynamic billing
or real-time power grid optimization-
2. This must be able to protect that information from
unauthorized usage or disclosure.
3. Information that power usage has dipped could
indicate that home is empty, making it an ideal
target for a burglary or worse.
![Page 41: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/41.jpg)
The Interaction Time
You may Pose Questions Now
![Page 42: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/42.jpg)
The Security Architecture
Features
![Page 43: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/43.jpg)
Security and privacy issues
● Resilience to attacks
● Data Authentication
● Access Control
● Client privacy
![Page 44: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/44.jpg)
Security and privacy issues
● Resilience to attacks
○ the system has to avoid single
points of failure and adjust itself
to node failures
![Page 45: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/45.jpg)
Security and privacy issues
● Data Authentication
○ As a rule, retrieved address and
object information must be
authenticated
![Page 46: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/46.jpg)
Security and privacy issues
● Access Control
○ Information providers must be
able to implement access control
on the data provided
![Page 47: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/47.jpg)
Security and privacy issues ● Client privacy
○ measures need to be taken that only the
information provider is able to infer
from observing the use of the lookup
system related to a specific customer; at
least inference should be very hard to
conduct
![Page 48: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/48.jpg)
The Interaction Time
You may Pose Questions Now
![Page 49: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/49.jpg)
The Security Architecture
Solutions
![Page 50: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/50.jpg)
Building Security for IoT1. No one single control is going to adequately protect
a device in an IoT environment.
2. Hence, a multi-layered approach to security that
starts at the beginning when the
1. power is applied,
2. establishes a trusted computing baseline and
3. anchors that trust in something that can not be
tampered with.
![Page 51: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/51.jpg)
Building Security for IoTSecurity must be addressed throughout the device
lifecycle, from initial design to the operational
environment
1. Secure booting
2. Access control
3. Device authentication
4. Firewalling and IPS
5. Updates and patches
![Page 52: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/52.jpg)
Secure Booting•When power is first introduced to the device, the
authenticity and integrity of the software on the device is
verified using cryptographically generated digital
signature.
•A digital signature attached to the software image and
verified by the device ensures that only the software that has
been authorized to run on that device, and signed by the
entity that authorized it , will be loaded
•The foundation of trust has been established , but the
device still needs protection from various run-time threats
and malicious intentions
![Page 53: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/53.jpg)
Access Control• Different forms of resource and access
control are applied.
•Mandatory or role-based access controls
built into the operating system limit the
privileges' of device component and
applications so they access only the
resources they need to do their jobs.
![Page 54: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/54.jpg)
Device authentication• When a device is plugged into network, it
should authenticate itself prior receiving
or transmitting data.
• Machine authentication is similar to user
authentication
![Page 55: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/55.jpg)
Firewalling and IPS
The device needs a firewall or deep packet
inspection capability to control traffic that
is destined to terminate at the devices.
Example: smart energy grid
![Page 56: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/56.jpg)
Updates and patches Once the device is in operation, it will start
receiving hot patches and software
updates. software updates security patches
must be delivered in such a way that
conserves the limited bandwidth and
internet connectivity of an embedded device.
![Page 57: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/57.jpg)
The Interaction Time
You may Pose Questions Now
![Page 58: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/58.jpg)
Security requirements in each level
![Page 59: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/59.jpg)
Conclusions
• Privacy and security are essential features
of modern networks.
• Internet of Things is no exception
• Industry has built different security
approaches to ensure security and privacy
![Page 60: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/60.jpg)
The Security Architecture
Additional Dimensions
![Page 61: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/61.jpg)
Secure Multi-party computations( SMC)-1• Internet of Things will create tremendous
opportunities to improve people’s lives. The core
property of most ubiquitous applications is the ability
to perform joint cooperative tasks involving
computations with inputs supplied by separate parts or
things.
• These computations are performed by mutually
untrusting parties on inputs containing private
information containing user’s daily activities.
•
![Page 62: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/62.jpg)
Secure Multi-party computations( SMC)-2• Secure Multi-party computations may become a
relevant and practial approach that should be
considered as a technological enforcement to protect
user’s privacy
• Secure multi-party computation (also known as
secure computation or multi-party computation
(MPC)) is a subfield of cryptography with the goal to
create methods for parties to jointly compute a
function over their inputs, and keeping these inputs
private.
![Page 63: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/63.jpg)
Privacy enhancing Technologies ( PET)
• Virtual Private network(VPN)
• Transport layer Security ( TLS)
• DNS Security Extensions
• Onion Routing
• Private Information Retrieval (PIR)
![Page 64: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/64.jpg)
IoT in Action
The Conclusion
![Page 65: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/65.jpg)
Conclusions• IoT security design should enable an open, pervasive
and interoperable yet secure infrastructure
• For the sake of privacy and flexibility, IoT or smart
objects must be capable of implementing individual,
user set policies
• Infrastructural security services should be accessible
transparently and regardless of the connection uses by
nomadic smart IoT objects
![Page 66: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/66.jpg)
References
• An Overview of Privacy and security Issues in the
Internet of Things- Carlo Maria Medaglia and
Alexandru Serbanati
• Internet of Things and Privacy Preserving
Technologies- Vladimir Oleshchuk
• Internet of Things- New Security and Privacy
Challenges- Rolf H. Weber
![Page 67: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/67.jpg)
End of Session 2Questions
![Page 68: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/68.jpg)
Upcoming SESSIONS
Session 3
Applications of IoT
![Page 69: Will Internet of Things (IoT) be secure enough?](https://reader030.vdocument.in/reader030/viewer/2022032616/55a787491a28ab70188b46ce/html5/thumbnails/69.jpg)
Contact Information
Visithttp://dastikop.blogspot.in
email: [email protected]
http://youtube.com/user/dastikop