Explanation of how IOT works at home. One pattern from wake up to car
Things to things communication People process and thingsData and tesla example. -- A sensor is not a machine. It doesn’t do anything in the same sense that a machine does. It measures, it evaluates; in short, it gathers data. The Internet of Things really comes together with the connection of sensors and machines. That is to say, the real value that the Internet of Things creates is at the intersection of gathering data and leveraging it. All the information gathered by all the sensors in the world isn’t worth very much if there isn’t an infrastructure in place to analyze it in real time
Ecosystem Users - – the layer of users Network things – Where everything is connected Applications – The applications that user use to monitor the IOT systems Things – devices that are connected (Refrigerator, smart watch)
Functional – Excepted behavior vs actual behavior. Network – Where they are connected(Wifi, bluetooth, Intra network or Internet)How the network fluctuations might effect there(A self driving car lost network connection ) Performance – Communication happens b/w devices in RTOS Security – Getting access to home (Data, Privacy is involved) Compatibility – Applications either mobile or web. You cannot ask your user to upgrade to android 7 as app doesn&apos;t support. Exploratory – Unlike classical system use cases are very more – Testing the system as a user
What a classical system is? Testing doesn&apos;t break things. when it is at your place it breaks when it is in customers hands Even if you do all the traditional types of testings.
Agriculture based system explain how it works,
Component wise testing virtualization of sensors Tesla car example. In computer science, test stubs are programs that simulate the behaviors of software components (or modules) that a module undergoing tests depends on.
Thing to Thing – RTOS (Sensor says an obstacle at 50M distance car should stop or slow down there should be no delay) Multiple request handling. Synchronization. How the system behaves at low band width, what happens if there is any packet loss Hardware & power. How should I power my node wall adapter install wiring use batteries(any idea how much life is expected from a water meter battery) Can I transfer all data back to cloud Do we have bandwidth for all sensors Routing equipment Internet connectivity Will my node work if internet connection is lost? will street lights work if internet is down? Thanks my ISP had a fiber cut so no water today my ac is not working is there any problem with router
Disrupt services at home, refrigerator sends spam. Apply breaks suddenly Show wrong stats or remove stats. Steal network credentials and take personal data. Steal the information of the car hardware and other stuff. Steal health data or daily data Take control of your home control electrical devices Take control of the car. Take it to thieves Inject high insulin to body.
Device memory -Cleartext usernames, Cleartext passwords, Third-party credentials, Encryption keys Ecosystem -Interoperability standards Data governance System wide failure Individual stakeholder risks Physical Interfaces - Firmware extraction, User CLI Admin CLI,Privilege escalation Reset to insecure stateRemoval of storage media Tamper resistanceDebug port Device ID/Serial number exposure Network traffic – LAN, LAN to Internet, Short range Non-standard, Wireless (WiFi, Z-wave, Zigbee, Bluetooth),Protocol fuzzing Hardware - Sensing Environment Manipulation Tampering (Physically), Damaging (Physically) Authentication and authorization - Authentication/Authorization related values (session key, token, cookie, etc.) disclosure Reusing of session key, token, etc. Device to device authentication Device to mobile Application authentication Device to cloud system authentication Mobile application to cloud system authentication Web application to cloud system authentication Lack of dynamic authentication
A table like this where in having testing types and Components across will to understand what testing has to be applied at what parts of the system.
Internet Of Things
IOT - Testing Trends
Quality Analyst @ThoughtWorks
Twittter - @nalinikanth99
Car stopped in a fast lane.
Cars drive themselves to thieves – Disappearing cars.
Criminals steal your Amazon deliveries.
Self driving car met with accident and people died.
Thanks to my ISP, it had a fiber cut. so, no water today.
AC is not working as there an issue with router.
Authentication and Authorization
Attack surface areas
Should we secure the system ??
Secure by design.
Secured technology, process, and people.
Test for security.
Emphasize security from day one.
Lifecycle, future-proofing, updates.
Access control and device authentication.
Know your enemy.
Prepare for security breaches.