SlideShare a Scribd company logo
1 of 32
INTRODUCTION TO
IoT SECURITY
Mr. Rajasekar V.R.
Department of Information Technology
Sur College of Applied Sciences
Ministry of Higher Education
Sultanate of Oman
Introduction to IoT Security
2
12.1 The IoT Era Begins
12.2 Components of IoT-Enabled Things
12.3 IoT Reference model
12.4 IoT Security
12.5 IoT Security & Privacy Req. defined by ITU-T
12.6 An IoT Security Framework
12.7 IoT Security Challenges
12.8 Internet of Things - Liability
12.9 IoT security tools
• The future Internet will involve large numbers of objects that use standard
communications architectures to provide services to end users.
• It is envisioned that tens of billions of such devices will be interconnected in a
few years.
• This will provide new interactions between the physical world and computing,
digital content, analysis, applications, and services.
• This resulting networking paradigm is being called the Internet of Things (IoT).
• This will provide unprecedented opportunities for users, manufacturers, and
service providers in a wide variety of sectors.
• Areas that will benefit from IoT data collection, analysis, and automation
capabilities include health and fitness, healthcare, home monitoring and
automation, energy savings and smart grid, farming, transportation,
environmental monitoring, inventory and product management, security,
surveillance, education, and many others.
Introduction to IoT Security
3
 According to ITU-T Y.2060: Internet of Things (IoT): A global infrastructure for the
information society, enabling advanced services by interconnecting (physical and virtual)
things based on existing and evolving interoperable information and communication
technologies.
 Thing: With regard to the IoT, this is an object of the physical world (physical things) or the
information world (virtual things), which is capable of being identified and integrated into
communication networks.
 Device: With regard to the IoT, this is a piece of equipment with the mandatory capabilities
of communication and the optional capabilities of sensing, actuation, data capture, data
storage, and data processing.
 Physical objects + Controllers, Sensors, Actuators + Internet = IoT.
 An instance of the IoT consists of a collection of physical objects, each of which:
 Contains a microcontroller that provides intelligence
 Contains a sensor that measures some physical parameter/actuator that acts on some
physical parameter.
 Provides a means of communicating via the Internet or some other network.
Introduction to IoT Security
4
• IoT is characterized as adding the dimension “Any THING communication”
to the information and communication technologies which already provide
“any TIME” and “any PLACE” communication as show in the figure.
Introduction to IoT Security
5
• The key ingredients of an IoT-enabled thing are sensors, actuators, a
microcontroller, a means of communication (transceiver), and a means of
identification.
• A means of communication is an essential ingredient; otherwise, the device
cannot participate in a network.
• Nearly all IoT-enabled things have some sort of computing capability, no matter
how rudimentary and a device may have one or more of the other ingredients.
• Following diagram shows the interfaces for sensors and actuators.
Introduction to IoT Security
6
• ITU-T IoT reference model,
consists of four layers as well
as management capabilities and
security capabilities that apply
across layers.
• In terms of communications
functionality, the device layer
includes, roughly, the OSI
physical and data link layers.
Introduction to IoT Security
7
• IoT is perhaps the most complex and undeveloped area of network security.
• Below figure shows the main elements of interest for IoT security.
• At the center of the network are the application platforms, data storage
servers, and network and security management systems.
• These central systems gather data from sensors, send control signals to
actuators, and are responsible for managing the IoT devices and their
communication networks.
• At the edge of the network are IoT-enabled devices, some of which are quite
simple constrained devices and some of which are more intelligent
unconstrained devices.
• As well, gateways may perform protocol conversion and other networking
service on behalf of IoT devices.
• The shading in Figure - indicates the systems that support at least some of
the functions like TLS and IPsec.
• Unconstrained devices may or may not implement some security capability.
• Constrained devices generally have limited or no security features.
• Gateway devices can provide secure communication between the gateway
and the devices at the center, such as application platforms and management
platforms.
Introduction to IoT Security
8
Introduction to IoT Security
9
 ITU-T Recommendation Y.2066, Common Requirements of the Internet of Things,
June 2014, includes a list of security requirements for the IoT. The requirements
are as follows:
 Communication security: Secure, trusted, and privacy-protected communication
capability is required, so that unauthorized access to the content of data can be
prohibited, integrity of data can be guaranteed and privacy-related content of data
can be protected during data transmission or transfer in IoT.
 Data management security: Secure, trusted, and privacy-protected data
management capability is required, so that unauthorized access to the content of
data can be prohibited, integrity of data can be guaranteed and privacy-related
content of data can be protected when storing or processing data in IoT.
 Service provision security: Secure, trusted, and privacy-protected service
provision capability is required, so that unauthorized access to service and
fraudulent service provision can be prohibited and privacy information related to
IoT users can be protected.
Introduction to IoT Security
10
 Integration of security policies and techniques: The ability to integrate
different security policies and techniques is required, so as to ensure a
consistent security control over the variety of devices and user networks in
IoT.
 Mutual authentication and authorization: Before a device (or an IoT
user) can access the IoT, mutual authentication and authorization between
the device (or the IoT user) and IoT is required to be performed according to
predefined security policies.
 Security audit: Security audit is required to be supported in IoT. Any data
access or attempt to access IoT applications are required to be fully
transparent, traceable and reproducible according to appropriate regulation
and laws. In particular, IoT is required to support security audit for data
transmission, storage, processing, and application access.
Introduction to IoT Security
11
 Below figure, illustrates the security environment related to the logical structure
of an IoT.
 The IoT model is a simplified version of the World Forum IoT Reference
Model.
 It consists of the following levels:
Introduction to IoT Security
12
12.6.1 Smart objects/embedded systems:
• Consists of sensors, actuators, and other embedded systems at the edge of the
network.
• The devices may not be in a physically secure environment.
• Availability is certainly an issue. Need to be concerned about the authenticity and
integrity of the data generated by sensors.
• Protecting actuators and other smart devices from unauthorized use, privacy and
protection from eavesdropping may also be requirements.
12.6.2 Fog/edge network:
• This level is concerned with the wired and wireless interconnection of IoT devices.
• A key issue of concern is the wide variety of network technologies and protocols
used by the various IoT devices and the need to develop and enforce a uniform
security policy.
Introduction to IoT Security
13
12.6.3 Core network:
• Provides data paths between network center platforms and the
IoT devices.
• The security issues here are those confronted in traditional core
networks.
• However, the vast number of endpoints to interact with and
manage creates a substantial security burden.
12.6.4 Data center/cloud:
This level contains the application, data storage, and network
management platforms.
IoT does not introduce any new security issues at this level,
other than the necessity of dealing with huge numbers of
individual endpoints.
14
Introduction to IoT Security
Within this four-level architecture, the four general security capabilities that span multiple
levels are:
1. Role-based security:
• RBAC systems assign access rights to roles instead of individual users.
• In turn, users are assigned to different roles, either statically or dynamically, according to
their responsibilities.
• RBAC enjoys widespread commercial use in cloud and enterprise security and is a well-
understood tool that can be used to manage access to IoT devices and the data they
generate.
2. Antitamper and detection:
• This function is particularly important at the device and fog network levels but also
extends to the core network level.
• All of these levels may involve components that are physically outside the area of the
enterprise that is protected by physical security measures.
3. Data protection and confidentiality: These functions extend to all level of the
architecture.
4. Internet protocol protection: Protection of data in motion from eavesdropping and
snooping is essential between all levels.
Introduction to IoT Security
15
 Beyond costs and the ubiquity of devices, other security issues plague IoT:
12.7.1 Unpredictable Behavior:
• The sheer volume of deployed devices and their long list of enabling technologies
means their behavior in the field can be unpredictable.
• A specific system may be well designed and within administration control, but there
are no guarantees about how it will interact with others.
12.7.2 Device Similarity:
• IoT devices are fairly uniform.
• They utilize the same connection technology and components.
• If one system or device suffers from a vulnerability, many more have the same issue.
12.7.3 Problematic Deployment:
• One of the main goals of IoT remains to place advanced networks and analytics where
they previously could not go.
• Unfortunately, this creates the problem of physically securing the devices in these
strange or easily accessed places.
Introduction to IoT Security
16
12.7.4 Long Device Life and Expired Support:
• One of the benefits of IoT devices is longevity, however, that long life also means they may
outlive their device support.
• Compare this to traditional systems which typically have support and upgrades long after
many have stopped using them.
• Orphaned devices and abandon-ware lack the same security hardening of other systems due to
the evolution of technology over time.
12.7.5 No Upgrade Support:
• Many IoT devices, like many mobile and small devices, are not designed to allow upgrades or
any modifications.
• Others offer inconvenient upgrades, which many owners ignore, or fail to notice.
12.7.6 Poor or No Transparency:
• Many IoT devices fail to provide transparency with regard to their functionality.
• Users cannot observe or access their processes, and are left to assume how devices behave.
• They have no control over unwanted functions or data collection; furthermore, when a
manufacturer updates the device, it may bring more unwanted functions.
12.7.7 No Alerts:
• Another goal of IoT remains to provide its incredible functionality without being obtrusive.
• This introduces the problem of user awareness.
• Users do not monitor the devices or know when something goes wrong.
• Security breaches can persist over long periods without detection.
Introduction to IoT Security
17
 The security flaws of IoT and its ability to perform certain tasks open the door to any
associated liability.
 The three main areas of concern are device malfunction, attacks, and data theft.
 These issues can result in a wide variety of damages.
12.8.1 Device Malfunction
 IoT introduces a deeper level of automation which can have control over critical
systems, and systems impacting life and property.
 When these systems fail or malfunction, they can cause substantial damage; for
example, if an IoT furnace control system experiences a glitch, it may fail in an
unoccupied home and cause frozen pipes and water damage.
 This forces organizations to create measures against it.
12.8.2 Data Theft
 Data, IoT's strength and weakness, proves irresistible to many.
 These individuals have a number of reasons for their interest − the value of personal
data to marketing/advertising, identity theft, framing individuals for crimes, stalking,
and a bizarre sense of satisfaction.
 Measures used to fight attacks are also effective in managing this threat.Introduction to IoT Security
18
12.8.3 Cyber Attacks
 IoT devices expose an entire network and anything directly impacted to the risk of
attacks.
 Though those connections deliver powerful integration and productivity, they also
create the perfect opportunity for mayhem like a hacked stove or fire safety
sprinkler system.
 The best measures against this address the most vulnerable points, and provide
custom protections such as monitoring and access privileges.
 Some of the most effective measures against attacks prove simple:
 Built-in Security − Individuals and organizations should seek hardened devices,
meaning those with security integrated in the hardware and firmware.
 Encryption − This must be implemented by the manufacturer and through user
systems.
 Risk Analysis − Organizations and individuals must analyze possible threats in
designing their systems or choosing them.
 Authorization − Devices, whenever possible, must be subject to privilege policies
and access methods.
Introduction to IoT Security
19
The common security tools that are in use are:
1. Encryption
2. Password Protection
3. Hardware Security Modules
4. Two-factor authentication
5. Secure elements
6. Data erasure
7. PKI Certifications
8. Biometrics
9. Hardware Crypto processor
10. Blockchain
Introduction to IoT Security
20
12.9.1 Encryption
“Lightweight Cryptography (LWC)” - a cryptographic algorithm
or protocol tailored for implementation in constrained
environments including RFID tags, sensors, contactless smart
cards, health-care devices and so on.
The lightweight primitives are superior to conventional
cryptographic ones, which are currently used in the Internet
security protocols, e.g. IPsec, TLS.
Lightweight cryptography also delivers adequate security.
Lightweight cryptography does not always exploit the security-
efficiency trade-offs.
21
Introduction to IoT Security
12.9.2 Password Protection
Password-based authentication starts to look less attractive as a
security solution for IoT devices, for two reasons:
Passwords don't work well on dumb devices. They lack the
power to process or store passwords.
Passwords are a poor means of automated authentication.
Entering a password generally requires a human to do
something, and that's hard to automate. As a result, passwords
aren't good for securing automated exchanges of information.
22
Introduction to IoT Security
2.9.3 Hardware Security Modules
 A hardware security module (HSM) is a physical computing device that
safeguards and manages digital keys for strong authentication and
provides cryptoprocessing.
 These modules traditionally come in the form of a plug-in card or an external
device that attaches directly to a computer or network server.
 The functions of an HSM are:
 onboard secure cryptographic key generation
 onboard secure cryptographic key storage and management
 use of cryptographic and sensitive data material
 offloading application servers for complete asymmetric and symmetric
cryptography.
23
Introduction to IoT Security
2.9.4 Two-factor authentication
 Two-factor authentication (2FA), often referred to as two-step verification, is a
security process in which the user provides two authentication factors to verify
they are who they say they are.
 2FA can be contrasted with single-factor authentication(SFA), a security
process in which the user provides only one factor- typically a password.
 Two-factor authentication provides an additional layer of security and makes it
harder for attackers to gain access.
 Two-factor authentication has long
been used to control access to sensitive
systems and data.
 2FA to prevent their users' data from being
accessed by attackers.
24
Introduction to IoT Security
2.9.5 Embedded Security software blocks
 The embedded security software block is a tamper-proof chip available in
different sizes and designs, embedded in any mobile device.
 It ensures the data is stored in a safe place and information is given to only
authorized applications and people.
 It is like a personal ID for the end-user and for the device itself.
Introduction to IoT Security
25
2.9.6 Secure elements
The Secure Element is a tamper resistant hardware component
embedded in IoT and industrial connected equipment and machines
to deliver smart card level digital security and device lifecycle
management.
The Secure Element serves as the foundation of trust in advanced
end-to-end security architecture that protects data integrity and
defends against cyber-attacks.
Secure elements ensure that data is stored in a safe place and that
access is granted only to authorized applications and people.
It also enables over-the-air management of security credentials,
software updates and evolving security capabilities across the
lifecycle of solutions.
26
Introduction to IoT Security
2.9.7 Data erasure
Data erasure (sometimes referred to as data clearing or data
wiping) is a software-based method of overwriting the data that
aims to completely destroy all electronic data residing on a hard
disk drive or other digital media by using zeros and ones to
overwrite data onto all sectors of the device.
By overwriting the data on the storage device, the data is rendered
unrecoverable and achieves data sanitization.
Ideally, software designed for data erasure should:
Allow for selection of a specific standard, based on unique needs,
and
Verify the overwriting methodology has been
successful and removed data across the entire
device.
27
Introduction to IoT Security
2.9.8 PKI Certifications
 A public key infrastructure (PKI) is a set of roles, policies, and procedures needed
to create, manage, distribute, use, store, and revoke digital certificates and
manage public-key encryption.
 The purpose of a PKI is to facilitate the secure electronic transfer of information
for a range of network activities such as e-commerce, internet banking and
confidential email.
 It is required for activities where simple passwords are an inadequate
authentication method and more rigorous proof is required to confirm the identity
of the parties involved in the communication and to validate the information
being transferred.
2.9.9 Biometrics
 Biometric authentication is the process of comparing data for the person's
characteristics to that person's biometric "template" in order to determine
resemblance.
 The reference model is first store in a database or a secure portable element like a
smart card.
 The data stored is then compared to the person's biometric data to be
authenticated.
 Here it is the person's identity which is being verified.
28
Introduction to IoT Security
2.9.10 Hardware Crypto processor
 A secure cryptoprocessor is a dedicated computer on a
chip or microprocessor for carrying out cryptographic operations, embedded in
a packaging with multiple physical security measures, which give it a degree
of tamper resistance.
 Unlike cryptographic processors that output decrypted data onto a bus in a
secure environment, a secure cryptoprocessor does not output decrypted data or
decrypted program instructions in an environment where security cannot
always be maintained.
 The purpose of a secure cryptoprocessor is to act as the keystone of a security
subsystem, eliminating the need to protect the rest of the subsystem with
physical security measures
29
Introduction to IoT Security
2.9.11 Blockchain
Blockchain is a database that maintains a continuously growing set
of data records.
It is distributed in nature, meaning that there is no master
computer holding the entire chain.
Rather, the participating nodes have a copy of the chain.
It’s also ever-growing — data records are only added to the chain.
A blockchain consists of two types of elements:
1. Transactions are the actions created by the participants in the
system.
2. Blocks record these transactions and make sure they are in the
correct sequence and have not been tampered with. Blocks also
record a time stamp when the transactions were added.
30
Introduction to IoT Security
Blockchain technology offers a way of recording transactions
or any digital interaction in a way that is designed to be secure,
transparent, highly resistant to outages, auditable, and
efficient; as such, it carries the possibility of disrupting
industries and enabling new business models.
By merging Blockchain with IoT it is easier to implement
confidentiality and integrity.
This allows the connected devices to respond to fabrication
and modification attacks and enhances the trust between the
parties in communication."
31
Introduction to IoT Security
32
Introduction to IoT Security

More Related Content

What's hot

Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Iot architecture
Iot architectureIot architecture
Iot architectureAnam Iqbal
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT SecuritySHAAMILIVARSAGV
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical SystemsBob Marcus
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Securitynoornabi16
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 

What's hot (20)

Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 

Similar to Introduction to IoT Security Framework

Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019GoQA
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
The Need For IoT Gateway.docx
The Need For IoT Gateway.docxThe Need For IoT Gateway.docx
The Need For IoT Gateway.docxSVITSEEERK
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTMuhammad Ahad
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
IOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITSIOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITSDineshV95
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...cyberprosocial
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET Journal
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
Understanding the Logical Design of IoT.pdf
Understanding the Logical Design of IoT.pdfUnderstanding the Logical Design of IoT.pdf
Understanding the Logical Design of IoT.pdfashumasih3
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...RSIS International
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...RSIS International
 

Similar to Introduction to IoT Security Framework (20)

Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
The Need For IoT Gateway.docx
The Need For IoT Gateway.docxThe Need For IoT Gateway.docx
The Need For IoT Gateway.docx
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
IOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITSIOT TOTAL POWER POINT PRESENTATION UNITS
IOT TOTAL POWER POINT PRESENTATION UNITS
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
Understanding the Logical Design of IoT.pdf
Understanding the Logical Design of IoT.pdfUnderstanding the Logical Design of IoT.pdf
Understanding the Logical Design of IoT.pdf
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...
 

More from CAS

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCAS
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4CAS
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1CAS
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodologyCAS
 
Can you solve this
Can you solve thisCan you solve this
Can you solve thisCAS
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentialityCAS
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authenticationCAS
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Human resources security
Human resources securityHuman resources security
Human resources securityCAS
 
Database security
Database securityDatabase security
Database securityCAS
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic toolsCAS
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)CAS
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2CAS
 

More from CAS (20)

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Human resources security
Human resources securityHuman resources security
Human resources security
 
Database security
Database securityDatabase security
Database security
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2
 

Recently uploaded

Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 

Introduction to IoT Security Framework

  • 1. INTRODUCTION TO IoT SECURITY Mr. Rajasekar V.R. Department of Information Technology Sur College of Applied Sciences Ministry of Higher Education Sultanate of Oman
  • 2. Introduction to IoT Security 2 12.1 The IoT Era Begins 12.2 Components of IoT-Enabled Things 12.3 IoT Reference model 12.4 IoT Security 12.5 IoT Security & Privacy Req. defined by ITU-T 12.6 An IoT Security Framework 12.7 IoT Security Challenges 12.8 Internet of Things - Liability 12.9 IoT security tools
  • 3. • The future Internet will involve large numbers of objects that use standard communications architectures to provide services to end users. • It is envisioned that tens of billions of such devices will be interconnected in a few years. • This will provide new interactions between the physical world and computing, digital content, analysis, applications, and services. • This resulting networking paradigm is being called the Internet of Things (IoT). • This will provide unprecedented opportunities for users, manufacturers, and service providers in a wide variety of sectors. • Areas that will benefit from IoT data collection, analysis, and automation capabilities include health and fitness, healthcare, home monitoring and automation, energy savings and smart grid, farming, transportation, environmental monitoring, inventory and product management, security, surveillance, education, and many others. Introduction to IoT Security 3
  • 4.  According to ITU-T Y.2060: Internet of Things (IoT): A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies.  Thing: With regard to the IoT, this is an object of the physical world (physical things) or the information world (virtual things), which is capable of being identified and integrated into communication networks.  Device: With regard to the IoT, this is a piece of equipment with the mandatory capabilities of communication and the optional capabilities of sensing, actuation, data capture, data storage, and data processing.  Physical objects + Controllers, Sensors, Actuators + Internet = IoT.  An instance of the IoT consists of a collection of physical objects, each of which:  Contains a microcontroller that provides intelligence  Contains a sensor that measures some physical parameter/actuator that acts on some physical parameter.  Provides a means of communicating via the Internet or some other network. Introduction to IoT Security 4
  • 5. • IoT is characterized as adding the dimension “Any THING communication” to the information and communication technologies which already provide “any TIME” and “any PLACE” communication as show in the figure. Introduction to IoT Security 5
  • 6. • The key ingredients of an IoT-enabled thing are sensors, actuators, a microcontroller, a means of communication (transceiver), and a means of identification. • A means of communication is an essential ingredient; otherwise, the device cannot participate in a network. • Nearly all IoT-enabled things have some sort of computing capability, no matter how rudimentary and a device may have one or more of the other ingredients. • Following diagram shows the interfaces for sensors and actuators. Introduction to IoT Security 6
  • 7. • ITU-T IoT reference model, consists of four layers as well as management capabilities and security capabilities that apply across layers. • In terms of communications functionality, the device layer includes, roughly, the OSI physical and data link layers. Introduction to IoT Security 7
  • 8. • IoT is perhaps the most complex and undeveloped area of network security. • Below figure shows the main elements of interest for IoT security. • At the center of the network are the application platforms, data storage servers, and network and security management systems. • These central systems gather data from sensors, send control signals to actuators, and are responsible for managing the IoT devices and their communication networks. • At the edge of the network are IoT-enabled devices, some of which are quite simple constrained devices and some of which are more intelligent unconstrained devices. • As well, gateways may perform protocol conversion and other networking service on behalf of IoT devices. • The shading in Figure - indicates the systems that support at least some of the functions like TLS and IPsec. • Unconstrained devices may or may not implement some security capability. • Constrained devices generally have limited or no security features. • Gateway devices can provide secure communication between the gateway and the devices at the center, such as application platforms and management platforms. Introduction to IoT Security 8
  • 9. Introduction to IoT Security 9
  • 10.  ITU-T Recommendation Y.2066, Common Requirements of the Internet of Things, June 2014, includes a list of security requirements for the IoT. The requirements are as follows:  Communication security: Secure, trusted, and privacy-protected communication capability is required, so that unauthorized access to the content of data can be prohibited, integrity of data can be guaranteed and privacy-related content of data can be protected during data transmission or transfer in IoT.  Data management security: Secure, trusted, and privacy-protected data management capability is required, so that unauthorized access to the content of data can be prohibited, integrity of data can be guaranteed and privacy-related content of data can be protected when storing or processing data in IoT.  Service provision security: Secure, trusted, and privacy-protected service provision capability is required, so that unauthorized access to service and fraudulent service provision can be prohibited and privacy information related to IoT users can be protected. Introduction to IoT Security 10
  • 11.  Integration of security policies and techniques: The ability to integrate different security policies and techniques is required, so as to ensure a consistent security control over the variety of devices and user networks in IoT.  Mutual authentication and authorization: Before a device (or an IoT user) can access the IoT, mutual authentication and authorization between the device (or the IoT user) and IoT is required to be performed according to predefined security policies.  Security audit: Security audit is required to be supported in IoT. Any data access or attempt to access IoT applications are required to be fully transparent, traceable and reproducible according to appropriate regulation and laws. In particular, IoT is required to support security audit for data transmission, storage, processing, and application access. Introduction to IoT Security 11
  • 12.  Below figure, illustrates the security environment related to the logical structure of an IoT.  The IoT model is a simplified version of the World Forum IoT Reference Model.  It consists of the following levels: Introduction to IoT Security 12
  • 13. 12.6.1 Smart objects/embedded systems: • Consists of sensors, actuators, and other embedded systems at the edge of the network. • The devices may not be in a physically secure environment. • Availability is certainly an issue. Need to be concerned about the authenticity and integrity of the data generated by sensors. • Protecting actuators and other smart devices from unauthorized use, privacy and protection from eavesdropping may also be requirements. 12.6.2 Fog/edge network: • This level is concerned with the wired and wireless interconnection of IoT devices. • A key issue of concern is the wide variety of network technologies and protocols used by the various IoT devices and the need to develop and enforce a uniform security policy. Introduction to IoT Security 13
  • 14. 12.6.3 Core network: • Provides data paths between network center platforms and the IoT devices. • The security issues here are those confronted in traditional core networks. • However, the vast number of endpoints to interact with and manage creates a substantial security burden. 12.6.4 Data center/cloud: This level contains the application, data storage, and network management platforms. IoT does not introduce any new security issues at this level, other than the necessity of dealing with huge numbers of individual endpoints. 14 Introduction to IoT Security
  • 15. Within this four-level architecture, the four general security capabilities that span multiple levels are: 1. Role-based security: • RBAC systems assign access rights to roles instead of individual users. • In turn, users are assigned to different roles, either statically or dynamically, according to their responsibilities. • RBAC enjoys widespread commercial use in cloud and enterprise security and is a well- understood tool that can be used to manage access to IoT devices and the data they generate. 2. Antitamper and detection: • This function is particularly important at the device and fog network levels but also extends to the core network level. • All of these levels may involve components that are physically outside the area of the enterprise that is protected by physical security measures. 3. Data protection and confidentiality: These functions extend to all level of the architecture. 4. Internet protocol protection: Protection of data in motion from eavesdropping and snooping is essential between all levels. Introduction to IoT Security 15
  • 16.  Beyond costs and the ubiquity of devices, other security issues plague IoT: 12.7.1 Unpredictable Behavior: • The sheer volume of deployed devices and their long list of enabling technologies means their behavior in the field can be unpredictable. • A specific system may be well designed and within administration control, but there are no guarantees about how it will interact with others. 12.7.2 Device Similarity: • IoT devices are fairly uniform. • They utilize the same connection technology and components. • If one system or device suffers from a vulnerability, many more have the same issue. 12.7.3 Problematic Deployment: • One of the main goals of IoT remains to place advanced networks and analytics where they previously could not go. • Unfortunately, this creates the problem of physically securing the devices in these strange or easily accessed places. Introduction to IoT Security 16
  • 17. 12.7.4 Long Device Life and Expired Support: • One of the benefits of IoT devices is longevity, however, that long life also means they may outlive their device support. • Compare this to traditional systems which typically have support and upgrades long after many have stopped using them. • Orphaned devices and abandon-ware lack the same security hardening of other systems due to the evolution of technology over time. 12.7.5 No Upgrade Support: • Many IoT devices, like many mobile and small devices, are not designed to allow upgrades or any modifications. • Others offer inconvenient upgrades, which many owners ignore, or fail to notice. 12.7.6 Poor or No Transparency: • Many IoT devices fail to provide transparency with regard to their functionality. • Users cannot observe or access their processes, and are left to assume how devices behave. • They have no control over unwanted functions or data collection; furthermore, when a manufacturer updates the device, it may bring more unwanted functions. 12.7.7 No Alerts: • Another goal of IoT remains to provide its incredible functionality without being obtrusive. • This introduces the problem of user awareness. • Users do not monitor the devices or know when something goes wrong. • Security breaches can persist over long periods without detection. Introduction to IoT Security 17
  • 18.  The security flaws of IoT and its ability to perform certain tasks open the door to any associated liability.  The three main areas of concern are device malfunction, attacks, and data theft.  These issues can result in a wide variety of damages. 12.8.1 Device Malfunction  IoT introduces a deeper level of automation which can have control over critical systems, and systems impacting life and property.  When these systems fail or malfunction, they can cause substantial damage; for example, if an IoT furnace control system experiences a glitch, it may fail in an unoccupied home and cause frozen pipes and water damage.  This forces organizations to create measures against it. 12.8.2 Data Theft  Data, IoT's strength and weakness, proves irresistible to many.  These individuals have a number of reasons for their interest − the value of personal data to marketing/advertising, identity theft, framing individuals for crimes, stalking, and a bizarre sense of satisfaction.  Measures used to fight attacks are also effective in managing this threat.Introduction to IoT Security 18
  • 19. 12.8.3 Cyber Attacks  IoT devices expose an entire network and anything directly impacted to the risk of attacks.  Though those connections deliver powerful integration and productivity, they also create the perfect opportunity for mayhem like a hacked stove or fire safety sprinkler system.  The best measures against this address the most vulnerable points, and provide custom protections such as monitoring and access privileges.  Some of the most effective measures against attacks prove simple:  Built-in Security − Individuals and organizations should seek hardened devices, meaning those with security integrated in the hardware and firmware.  Encryption − This must be implemented by the manufacturer and through user systems.  Risk Analysis − Organizations and individuals must analyze possible threats in designing their systems or choosing them.  Authorization − Devices, whenever possible, must be subject to privilege policies and access methods. Introduction to IoT Security 19
  • 20. The common security tools that are in use are: 1. Encryption 2. Password Protection 3. Hardware Security Modules 4. Two-factor authentication 5. Secure elements 6. Data erasure 7. PKI Certifications 8. Biometrics 9. Hardware Crypto processor 10. Blockchain Introduction to IoT Security 20
  • 21. 12.9.1 Encryption “Lightweight Cryptography (LWC)” - a cryptographic algorithm or protocol tailored for implementation in constrained environments including RFID tags, sensors, contactless smart cards, health-care devices and so on. The lightweight primitives are superior to conventional cryptographic ones, which are currently used in the Internet security protocols, e.g. IPsec, TLS. Lightweight cryptography also delivers adequate security. Lightweight cryptography does not always exploit the security- efficiency trade-offs. 21 Introduction to IoT Security
  • 22. 12.9.2 Password Protection Password-based authentication starts to look less attractive as a security solution for IoT devices, for two reasons: Passwords don't work well on dumb devices. They lack the power to process or store passwords. Passwords are a poor means of automated authentication. Entering a password generally requires a human to do something, and that's hard to automate. As a result, passwords aren't good for securing automated exchanges of information. 22 Introduction to IoT Security
  • 23. 2.9.3 Hardware Security Modules  A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing.  These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.  The functions of an HSM are:  onboard secure cryptographic key generation  onboard secure cryptographic key storage and management  use of cryptographic and sensitive data material  offloading application servers for complete asymmetric and symmetric cryptography. 23 Introduction to IoT Security
  • 24. 2.9.4 Two-factor authentication  Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are.  2FA can be contrasted with single-factor authentication(SFA), a security process in which the user provides only one factor- typically a password.  Two-factor authentication provides an additional layer of security and makes it harder for attackers to gain access.  Two-factor authentication has long been used to control access to sensitive systems and data.  2FA to prevent their users' data from being accessed by attackers. 24 Introduction to IoT Security
  • 25. 2.9.5 Embedded Security software blocks  The embedded security software block is a tamper-proof chip available in different sizes and designs, embedded in any mobile device.  It ensures the data is stored in a safe place and information is given to only authorized applications and people.  It is like a personal ID for the end-user and for the device itself. Introduction to IoT Security 25
  • 26. 2.9.6 Secure elements The Secure Element is a tamper resistant hardware component embedded in IoT and industrial connected equipment and machines to deliver smart card level digital security and device lifecycle management. The Secure Element serves as the foundation of trust in advanced end-to-end security architecture that protects data integrity and defends against cyber-attacks. Secure elements ensure that data is stored in a safe place and that access is granted only to authorized applications and people. It also enables over-the-air management of security credentials, software updates and evolving security capabilities across the lifecycle of solutions. 26 Introduction to IoT Security
  • 27. 2.9.7 Data erasure Data erasure (sometimes referred to as data clearing or data wiping) is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media by using zeros and ones to overwrite data onto all sectors of the device. By overwriting the data on the storage device, the data is rendered unrecoverable and achieves data sanitization. Ideally, software designed for data erasure should: Allow for selection of a specific standard, based on unique needs, and Verify the overwriting methodology has been successful and removed data across the entire device. 27 Introduction to IoT Security
  • 28. 2.9.8 PKI Certifications  A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.  The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email.  It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred. 2.9.9 Biometrics  Biometric authentication is the process of comparing data for the person's characteristics to that person's biometric "template" in order to determine resemblance.  The reference model is first store in a database or a secure portable element like a smart card.  The data stored is then compared to the person's biometric data to be authenticated.  Here it is the person's identity which is being verified. 28 Introduction to IoT Security
  • 29. 2.9.10 Hardware Crypto processor  A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance.  Unlike cryptographic processors that output decrypted data onto a bus in a secure environment, a secure cryptoprocessor does not output decrypted data or decrypted program instructions in an environment where security cannot always be maintained.  The purpose of a secure cryptoprocessor is to act as the keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures 29 Introduction to IoT Security
  • 30. 2.9.11 Blockchain Blockchain is a database that maintains a continuously growing set of data records. It is distributed in nature, meaning that there is no master computer holding the entire chain. Rather, the participating nodes have a copy of the chain. It’s also ever-growing — data records are only added to the chain. A blockchain consists of two types of elements: 1. Transactions are the actions created by the participants in the system. 2. Blocks record these transactions and make sure they are in the correct sequence and have not been tampered with. Blocks also record a time stamp when the transactions were added. 30 Introduction to IoT Security
  • 31. Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models. By merging Blockchain with IoT it is easier to implement confidentiality and integrity. This allows the connected devices to respond to fabrication and modification attacks and enhances the trust between the parties in communication." 31 Introduction to IoT Security