Demos – Smart Security Week 2017
Smart Security Week - The Trusted Innovation Summer Forum | September 25-27, 2017 – Marseille, France

Demos

MYÆVATAR

The MyÆvatar demo illustrates how, step-by-step, a citizen creates, under his sole and unique control, a self-sovereign digital identity that empowers him to smoothly automate strong authentication sessions when processing web-based transactions for everyday use.

Step 1 : Activation of the MyÆvatar app onto a standard Android smartphone.
Step 2 : Initiate the “Remote identity proofing” with a guided collection of several identity proof by mobile scanning :  driving license, a utility bill, and a selfie
Step 3 : Automated verification against selected Identity Providers, the “IdP”.
Step 4: Strong facial biometric authentication to generate Tokenized Claims
Step 5: Generate a peer2peer payment via secured Instant Messaging
Step 6: Generate a one-time access token that will be consumed by an eGate Camera (MatchOnToken)

ARMOUR

To satisfy IoT/M2M market and policy security requirements, suitable duly tested solutions are needed to cope with security, privacy and safety also taking into account large scale IoT deployment. A testbench aimed at evaluating security level of IoT applications will be presented.

The global architecture of the demo is provided in the following figure:

Click on the image to enlarge it

 

The demo thus aims at establishing a security benchmark evaluation of IoT devices being connected to a testbed.

Two scenarios related to the security of IoT/M2M oneM2M are applied to the oneM2M case. Results of testing scenario are be used to calculate a security label for the device under test.

– The first scenario is the security testing of a oneM2M Application (AE) using TTCN-3 security test cases. An Upper Tester sends triggering commands to the System Under Test (SUT). For the execution of security test cases, our SUT needs a credential manager delivering an encryption key. All triggering commends are finally examined by the test tool in order to assert on the results according to its defined test oracle (pass/fail status).

–  The second scenario, is an interoperability test case in an end to end security test environment. We validate starting from the device through to key retrieval, the encryption and secure storage of device data in the oneM2M platform.

The demo will include nice screen to present test execution and test results as well as poster, so to provide an attractive and enligthing demonstration to the visitors.

DARKTRACE ANTIGENA

When the human immune system is faced with a new threat, not only can it detect it, but it produces antibodies that bind to it, and ultimately neutralize it. Darktrace Antigena replicates this function of the human immune system, by creating ‘digital antibodies’ in response to in-progress threats. Darktrace Antigena acts automatically to restrain or contain threats quickly enough to allow humans to catch up. It could only take 20 minutes for a major threat, such as a ransomware attack, to evolve into a crisis – Darktrace Antigena’s automated action slows, or stops threats in a targeted fashion, to provide security teams with a vital time window in which to take mitigating action. Darktrace Antigena’s autonomous response capability allows organizations to directly fight back, and networks to self-defend against specific threats, without disrupting your organization.

ICTK

ICTK presents three demo activities as below:
1. IoT security demo:
IoT security, machine authentication, data encryption, and data integrity are performed on a ‘Raspberry Pi’ platform. The VIA PUF Authenticator, IL005 (GIANT) encrypts the temperature and humidity data from sensors and generates message authentication code with VIA PUF protected crypto-keys.
2. Anti-counterfeiting for printer cartridge demo:
The VIA PUF Authenticator, IL005 (GIANT) provides cryptographic authentication for consumables. A random challenge from printer is given to an IL005 (GIANT) mounted on a printer cartridge. Then the IL005 (GIANT) generates a corresponding response with PUF protected key. Another IL005 (GIANT) mounted at the host side verifies the response from the cartridge.
3. Anti-counterfeiting for non-electronic products
The NFC tag protected by VIA PUF for anti-counterfeiting for the non-electronic products such as liquor, cosmetics, medicines, luxury goods, etc. Smartphone is the communication media through NFC between target product being authenticated and server. This system is not only to provide authentication, but also contribute in collecting big data from consumers. It also supports to prevent from night- shifting.