IERC Internet of Things g – Governance “Without changing our pattern of thought, we will not be able to solve the problems we created with our current patterns of thought. thought.” Albert Einstein Coordinator of IERC Ovidiu.Vermesan@sintef.no IERC C EC CC Coordinator, Peter.Friess@ec.europa.eu @ www.internet-of-things-research.eu Societal Needs “Development that meets the needs of the present without compromising p p g the ability y of future generations to meet their own needs.” Economic E i Environmental S i l/C l Social/Cultural l Governance G Innovation C Communications i i IERC Societal Trends Internationalization / globalization Increased mobility of people and goods Increase financial transactions Electronic processing processing-/control /control systems Misuse, theft of IDs Si ifi Significant t potential t ti l for f serious i crimes i Increased paranoia ... New technological developments to meet these challenges IERC Societal Trends Internet + Me = ? Internet + You = Internet + Us = Internet + Things = Internet + Energy = I t Internet t + Services S i = Internet - Some of Us = ? Internet - Some of You = ? IERC Internet - medium of citizen empowerment Internet creation based on the idea of a p space p opened p to common area,, a public everyone. Anything that anybody would wish to say could be heard by anyone else with access to the Internet, and this worldwide community would be as large and diverse as humanity itself itself. The principle of freedom of speech Would be also embedded in the Internet’s robust architecture, i.e the structure of a network able to adapt itself almost instantaneously to damage or outages to individual sections sections. IERC Internet - medium of citizen empowerment Indeed it’s quite impossible to completely block access to information, but it’s unfortunately used. In the last years, state sponsored censorship, monitoring and surveillance of the Internet have been increased increased, encouraging defence organisms to alert the international community The launch the “Online Free Expression Day” in 2008. A widely publicised example of censorship is the “Great Firewall”, a system that blocks content by preventing IP addresses from being routed through. Despite all the breaches of freedom of speech speech, the Web remains a great tool to express oneself. IERC Internet - medium of citizen empowerment Internet provide universal access to free speech, promotes the basic concept p of freedom of Internet p speech. Internet opened new possibilities for exercising this right: anonymity anonymity, data havens havens, easiness that allow free speech by guaranteeing that material cannot be removed. IERC Internet - medium of citizen empowerment Web 2.0 introduced a double pillar: inter connectivity and interactivity of web-delivered content t t in i a medium di used d as a platform l tf b by it its users. Web 2 2.0 0 concepts have led to the development and evolution of web culture communities and hosted services, social-networking sites, video sharing sites, wikis blogs wikis, blogs, that are so many ways to express your point of view. Being a space created to and by users, Internet protects itself from being controlled by a single actor actor. Plurality of voices is born from the plurality of contributions. Internet’s features can help to develop tools to fight against its own censorship IERC Internet The Internet was not built with security in mind. mind Most IT systems and applications that connect to the Internet were not developed with security in mind either, nor has there been much incentive to do so. A majority of cloud-computing providers don't believe security is their responsibility, responsibility nor do they see their customers demanding security or being willing to pay for it. Right now, cyberattacks are just the risk of doing business. Only when the risk of cyberattacks becomes unaffordable will cybersecurity be taken seriously. IERC The World Realities The Internet and Social Networks” are the drivers for freedom freedom. The “new” new revolutions are run via Internet. The elections are won on the Internet Classified information is “leaked” via Internet Cloud computing penetration 2011 a banner yyear for cybersecurity. y y IERC The World Realities High-profile cybersecurity disasters. Sony s PlayStation and Entertainment Networks hacked Sony's 100 million of the company's user accounts compromised and its online gaming halted for several weeks. k A security breach at the Internet marketing company Epsilon resulted in millions of customers' customers e e-mail mail addresses being taken from about 100 major corporations, including Disney Destinations in the United States and Dell in A stralia Australia. A cyberintrusion at Nonghyup, South Korea's main g cooperative, p , crashed its banking g systems y for a agricultural week and kept 30 million customers from accessing their accounts IERC The World Realities High-profile cybersecurity disasters. Blackmailers broke into the financial systems of Hyundai Capital, accessed the personal details of 1.75 million customers, and then demanded US $460 000 to keep the purloined information from being made public public. Attacks against security vendors like Comodo and RSA. A hacker fooled a Comodo g group p affiliate into issuing g Internet SSL certificates to some of the world's largest websites, including Google, Microsoft, Mozilla, Skype, and Yahoo. Partiall ssuccessful Partially ccessf l attack against RSA's two-factor t o factor authentication security product SecurID, which is used by 30 000 organizations around the world, IERC The World Realities High-profile cybersecurity disasters. Attacks against a number of major U.S. defense contractors, including the world's largest, Lockheed Martin. Successful cyberintrusions against government computer systems in i A Australia, li C Canada, d F France, and d the h U United i d States. The Canadian breach caused its treasury board as well as its department of finance to restrict access to the Internet for months. The breach in Australia apparently allowed access to the personal e-mail accounts of several top officials, possibly even that of Prime Minister Julia Gillard. IERC The World Realities High-profile cybersecurity disasters. Organizations monitoring cybersecurity activity indicate significant increases in the frequency of attacks over the p past five yyears - especially p y against g government IT systems. British government systems saw more than 650 attempted intrusions per day, while U.S. government systems received 15 000 suspicious hits per day, or about one everyy 6 seconds. with a leading gp position held by the US government. IERC Security ”Distrust circle” www.priway.com IERC Building Information Society Governance IERC Internet Governance “Internet governance is the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, i i l norms, rules, l d decision i i making ki procedures, d and d programmes th thatt shape the evolution and the use of the Internet. “(WGIG 2005). IERC Internet Governance - Status Internet is governance at global level consisted of a set of organisations, organisations including: ICANN (Internet Corporate for Assigned Names and Numbers), with a leading position held by the US government; Internet Governance Forum ((IGF), ), the main discussion body without any decision-making power; A set of private standard-setting organisations influenced by the private sector and academia, which hi h h have b been shaping h i th the structure t t off th the Internet. IERC Internet Governance - Status Challenges: Many governments have concerns about the primus inter pares role of the USA and the USheavyy private p sector. Many national governments could adopt a twotrack policy. Continue reclaiming control of their national e-spaces, with the risk of fragmentation of the global Internet. A Accelerate l t pressure on the th USA ttowards d complete l t internationalisation of Internet governance and, in particular, of ICANN. p IERC Internet Governance - Status Scenarios: Internet fragmentation fragmentation. All major Internet companies are based in the USA (Google, Facebook, Yahoo), and most Internet traffic is passing through the USA, and English is the main language. Internet fragmentation will change this. If different countries start creating their own national clouds, the main casualty will be companies like Amazon, Google, and Facebook. IERC Internet Governance - Status Scenarios: Internationally agreed rules on Internet Internet. Can foster the preservation of one Internet as one global system. The necessary rules could be agreed upon by an international convention on the Internet and administered by an international organisation of the Internet, a possible amalgam of ICANN, the ITU and other main players in this field. Internet key characteristics Openness and freedom of access – could remain the same. Possible changes: more regulations and legal responsibilities in using the Internet. Anonymity on the Internet may be regulated. IERC OECD – Internet Governance Debate Pressures – regulatory, political, and economic – to fragment the internet internet, often along national borders. EU position: Promote freedom online. A multi-stakeholder approach that aimed to protect copyright holders from internet piracy. Commitment to an open internet, criticising corporate and governmental processes that could restrict internet development. Internet's Internet s most important characteristic is its universality, universality where, in principle, every node can communicate with every other and this must be safeguarded. IERC OECD – Internet Governance Debate Governance drivers in different countries Legitimate concerns, concerns like personal data protection; Plain censorship. IERC OECD – Internet Governance Debate Civil Society Information Society Advisory Council (CSISAC) position: Promote freedom online. g the Internet contradict Measures to control and fragment international and European human rights law Critical to the outlined methods for over-emphasis on IPR enforcement IPRs f t att the th expense off fundamental f d t l freedoms. To adopt a policy and legal frameworks that make internet intermediaries responsible for taking lawful steps to deter copyright infringement could create incentives for internet intermediaries to delete or block contested content, and lead to network t k filtering. filt i IERC OECD – Internet Governance Debate Civil Society Information Society Advisory Council (CSISAC) position: Against the idea of cutting off internet access, as outlined in the OECD's OECD s proposal Oppose the fact that “Internet intermediaries could voluntarily adopt “graduated response” policies under which internet users’ access could be terminated based solely on repeated allegations of infringement. Believes that these measures contradict international and European human rights law. IERC Internet + Things + Governance "Internet of Things“ reflects the vision of embedded communication and computing in “embedded" which “identifiable” connected devices will be integrated into the environment. The Internet of Things is making the Invisible Visible Everywhere all the time. time Internet a platform that connects people to people, l people l to t machines, hi machines hi to t machines, people to things, things to things. IERC IoT + Cloud Computing + Governance The cloud today IERC IoT + Cloud Computing + Governance Security – Who is in control? kscottmorrison.files.wordpress.com/2009/12/cloudcontrolboundaries.jpg IERC IoT + Cloud Computing + Governance Cloud Computing Security Threats Top Seven Security Threats Abuse and Nefarious Use of Cloud Computing. Insecure Application pp Programming g g Interfaces. Malicious Insiders. Shared Technology Vulnerabilities. Data Loss/Leakage. Account, Service & Traffic Hijacking. Unknown Risk Profile. Cloud Security Alliance (CSA) cloudsecurityalliance.org/research/projects/security-guidance-for-critical-areas-of-focus-in-cloud-computing/ IERC Need for IoT Governance To accommodate things/object-connected needs and added dimensions IP-Independent Non-IP Private Computer Networks Human Link Internet Connected Non-IP-connected embedded computer and systems nodes Internet-connected end-computer nodes (100 billion by 2014) Object-connected technologies with or without embedded computers Human Link Need to liaise on Internet Governance Latent IoT Developments Physical object-defined World IERC Need for IoT Governance Governance must accommodate both the SCOPE and FUTURE of IoT GOVERNANCE Applications & Services IP-Independent Non-IP-connected embedded computer y nodes and systems Non-IP Private C Computer t Networks Internet-connected end-computer nodes Object-connected technologies with or without embedded computers Standards& Regulations Networks Communication C i ti Systems (100 billion by 2014) Human Link Applications & Services Internet Connected Human Routing Systems Link Storage Latent IoT Developments Processing Physical object-defined World Protocols Enabling Technologies – Object-connected technologies & ICT principles Source: CASAGRAS2, A. Furness IERC IoT Governance 3D Matrix Approach Smart Cities Applications Services Domains Smart Health Smart Grids Cloud WSN RFID Identification Storage Enabling Technologies IERC IoT Governance Governance within the international legal framework relating policy and provisions provisions, covering structure and functionality and recognizing the need for a regulatory framework as well as legal framework - self regulation and international agreements - self selfregulation through soft law IERC IoT Governance Recognising the significance of Internet governance and the need of specific elements Accommodating human-interface and associated privacy and security issues Recognising the need for global stakeholder participation p p and drawing g upon p principles p p of corporate governance g the need to govern g failure of,, or Accommodating attack on networks and on data capture and actuator/ control systems, as well as loss of connectivity ti it – accommodating d ti network t k functionality and development IERC IoT Governance Structural and operational factors Coding across the Internet and IoT Security and Privacy Safety Energy conservation policy Architectural developments Centralised or decentralised Regulations Standardisation Quality of Service Performance IERC IoT Governance Multi-disciplinary approach Technical Policy Economic Institutional Legal Multi-stakeholders Perspectives Governance Content • Technical • Policy • Economic • Institutional X • Structural • Operational • Legal Civil Society Business Governments International organizations, organizations Technical community IERC IoT Governance: structure Security policy and provisions Safety policy and provisions Energy conservation policy and provisions Regulatory policy and provisions Standardisation p policyy and provisions p Provisions and the nature of thing/objectconnected provisions – responsible use of materials devices and environmental materials, considerations IERC IoT Governance: operational and usage Global Numbering / Resolver scheme for identification and discovery Social capital, privacy and identity management policy and provisions Ethical + user protection policy and provisions Cyber-crime protection policy and provisions Intellectual Property p y protection p policy p y Performance Indicators, rules and norms for IoT operation Developmental policy IERC Framework for IoT Governance The Institutional Framework and identification of the IoT Governance stakeholder group Preparation of IoT Statement of Purpose and Structure as an initial reference document for developing international IoT Governance. E European norms and d guidelines id li for f IoT I T applications IERC IoT Governance The need of today, the benefit of tomorrow: Yes we need! Yes we can! Energy Green Transportation Water Air & Environment Materials Manufacturing/Industrial Agriculture Recycling & Waste IERC IERC IERC - European Research Cluster on the Internet of Things Thank you! Coordinator of IERC Ovidiu.Vermesan@sintef.no Ovidiu Vermesan@sintef no IERC EC Coordinator, Peter.Friess@ec.europa.eu