iot/cybersecurity module - university of hawaii...iot/cybersecurity module freddie wheeler jr., m.s....

22
IoT/Cybersecurity Module FREDDIE WHEELER JR., M.S. CANDIDATE ADVISOR: DR. REZA GHORBANI, PH.D. ASSOCIATE PROFESSOR, UH MANOA COLLEGE OF ENGINEERING

Upload: others

Post on 10-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

IoT/Cybersecurity ModuleFREDDIE WHEELER JR., M.S. CANDIDATEADVISOR: DR. REZA GHORBANI, PH.D.ASSOCIATE PROFESSOR, UH MANOA COLLEGE OF ENGINEERING

Page 2: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Executive Summary

Motivation for Research Cybersecurity Background Demonstration of Encryption/Decryption Example of Security Architecture Example of Attack and Mitigation strategies Physical Testbed/Devices/Software Future Work

Page 3: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Motivation for Research

Growth of the “Internet of Things” (IoT) sector has greatly increased with the proliferation of many devices that use the internet to increase functionality Examples: Nest Learning thermostat, Amazon Echo/Echo Dot

Many of the earlier IoT devices were not designed with cybersecurity in mind and are therefore vulnerabilities within a system’s security network

A need arises to properly secure the transfer of information in this new age of the “Internet of Things”

Page 4: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Cybersecurity Background

Supervisory Control and Data Acquisition (SCADA) systems are now using internet connections to help streamline communications and control

“Air-Gapped” systems have also been proven to be vulnerable Stuxnet attack of nuclear centrifuges is an example of an attack on an

air-gapped system

For SCADA systems in particular, a cybersecurity system must be able to reliably secure data in real time

Page 5: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Cybersecurity Background

Most cyphers are computationally expensive and therefore require expensive hardware to run Example: RSA key exchange

REDLab at UH Manoa is researching a type of hybrid cypher that can be implemented in lower cost FPGA-like devices, yet still provide reliable encryption in real-time

This will help secure reliable encryption of bi-directional communication that you often find in SCADA systems

Page 6: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Method of Bi-Directional CommunicationDevice 1 Device 2

Encryption

Encryption

EmbeddedData

Processor

EmbeddedData

Processor

Decryption

Decryption

Encrypted Message

Encrypted Message

Page 7: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Method of Encryption/Decryption

RSA Cypher

RSA Cypher

CNN Cypher

CNN Cypher

Data

Page 8: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Demonstration of Encryption/Decryption

Original Message

Encrypted Message

Decrypted Message

Page 9: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Demonstration of Encryption/Decryption

Original Message

Encrypted Message

Decrypted Message

Page 10: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Demonstration of Encryption/Decryption

Original Image Encrypted Image Decrypted Image

Page 11: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Example of Security Architecture

PSIM

PLC

FPGA/ASIC

GatewaySensor

Device/System

Wired Connection

RSA Key/SSH Tunnel Encryption

FPGA/ASIC

Traditional SCADA setup

Command Center

Page 12: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Attack and Mitigation Strategies

Device 1

Device 2

Device 3

Device 4

Device 5

Device 6

Command Center

Gateway

Gateway

Comparison of Real-Timeand Historical Data

Authentication

Command Center

Page 13: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Attack and Mitigation Strategies

Device 1

Device 2

Device 3

Device 4

Device 5

Device 6

Gateway

Gateway

Command Center

Command Center

Comparison of Real-Timeand Historical Data

Authentication

Page 14: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Attack and Mitigation Strategies

Device 1

Device 2

Device 3

Device 4

Device 5

Device 6

Gateway

Gateway

Command Center

Command Center

Comparison of Real-Timeand Historical Data

Authentication

Page 15: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Attack and Mitigation Strategies

Device 1

Device 2

Device 3

Device 4

Device 5

Device 6

Gateway

Gateway

Command Center

Command Center

Comparison of Real-Timeand Historical Data

Authentication

Page 16: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Physical Testbed

REDLab has built an inverter tested to test implementation of the hybrid cypher Uses Victron Energy

inverters and battery management system

Implementation of communication pathways has been done using SSH tunnels on low cost microcontrollers (WRT-node)

Page 17: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Physical Devices

Current prices of products with the security capacity to run in real time are extremely cost prohibitive to place in a nodal network like a SCADA system

Target price for REDLab developed device is less than $10 Devices are also being designed with the idea of universal

installation “Plug and Play” type of usage mentality

Page 18: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Network Structure

Node-RED is being used to help program the interface between the computers and servers

Interface with the encryption/decryption for simulation purposes

Graphical programming is intuitive and easy to customize

Page 19: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Future Work

Continue work on implementing cypher on microcontrollers and embedded microchips

Establish benchmarks for performance and iterate for improvements in security reliability and speed

Further develop inverter testbed to improve testing for both cybersecurity and power community needs

Page 20: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Acknowledgements and Thanks

Thank you to Dr. Reza Ghorbani and The University of Hawai`i at Manoa for their guidance and support. Also, thank you to my fellow researchers at the Renewable Energy Design Laboratory for their assistance and support.

Page 21: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Acknowledgements and Sponsors

Page 22: IoT/Cybersecurity Module - University of Hawaii...iot/cybersecurity module freddie wheeler jr., m.s. candidate advisor: dr. reza ghorbani, ph.d. associate professor, uh manoa college

Thank You for Your TimeANY QUESTIONS?