SlideShare a Scribd company logo
Brandon Walston
 Internet of Things or IoT is a network of
devices/objects that are interconnected, making
them programmable, adaptable, and potentially
capable of interacting with people
 What led to the growth of IoT?
◦ IPv6’s huge increase in address space is a huge factor
in the growth of IoT
 “the address space expansion means that we could
assign an IPv6 address to every atom on the surface
of the earth and still have enough addresses left to
do another 100+ earths.” – Steve Leibson
 IoT devices collect information and can be invisible to
the user/owner
 Most IoT devices do not have a privacy policy and are
not explicit on information they collect
 IoT devices can serve as a place for hackers to launch
attacks and gain access to information
 According to a June 2014 report by Hewlett Packard, 7
out of 10 IoT devices have some kind of security flaw –
with an average of 25 vulnerabilities per device
 IoT devices in the medical field such as insulin pumps
and MRI machines create more hackable access points.
◦ SANS Institute released study showing how 375 U.S.
healthcare organizations were actively compromised
between September 2012 and October 2013.
 FitBit data has already been admitted into court in
personal injury cases
 Federal Trade Commission called for manufacturers to
embed security in their IoT products
 Massachusetts senator Ed Markey released results of his
inquiry into the cybersecurity practices of major car
manufacturers. He called security measures
“inconsistent and incomplete”
 Make sure companies add a privacy policy for IoT
devices
 Clearly explain and inform users of the information that
is collected and risk involved
 Companies/Agencies beginning to include IoT should
have personnel that is trained to know the risk of IoT
and security countermeasures to prevent potential
breaches
 Build security into devices from the start rather than
near the end
 Consider Data Minimization, which is limiting the
amount of customer data that is collected
 What are five traits to consider when
implementing IoT?
◦ Privacy, Security, Cost, Level of Difficulty, and
Performance
 Thing-Centric
 Gateway-Centric
 Smartphone-Centric
 Cloud-Centric
 Enterprise-Centric
 Things are smart on their own and store most
of their data on-board.
◦ Communicate to the Internet only for centralized
coordination and analysis
◦ Favored by
 Construction
 Agriculture
 Utilities (infrastructure) and transportation
◦ Asset is remotely connected and is expensive/large
enough to carry much of computing resource
Advantages Disadvantages
 Optimized for real-time
onboard performance
 Resilient to poor-quality
connectivity
 Offers improved security
 Saves on communication
data since data is
selectively sent out or
received
 Cost and complexity are
added to the thing and the
edge of the network
(undesirable if simplicity
is important)
 Design flaws can lead to
devices/computing
resources on islands
 Requires specialized skills
in the embedded and
operational technologies,
which may be hard to find
 The gateway houses the application logic, stores
data and communicates with the Internet for the
things connected to it.
◦ Provides resources for devices
◦ Favored by
 Building Systems
 Utilities and Smart city assets (streetlights)
 Requires most of the resources (user interface,
app. Logic, data storage and analytics) are on the
gateway
Advantages Disadvantages
 Removes the need for
cost and complexity to
exist on things and
places it on gateway
 Gateways can act as
smarter portals to the
Internet
 Act as connector hub for
devices
 Act as IP address for all
devices connected to it
 Require an extra “tier”
(gateway itself) to
communicate with
Internet (extra point of
failure)
 Require that cost and
complexity reside on
the gateway (cannot use
the cloud)
 Smartphone or any mobile device houses the
application logic, stores data and
communicates with the Internet for devices
that are connected to it
◦ Things can be connected to the smartphone before
they are connected to the Internet
◦ Smartphone serves as gateway to the Internet
◦ Favored by following industries
 Wearable market (apple watch, fit bit)
 Mobile health – monitoring equipment
 Consumer home items (power tools, toys, appliances)
Advantages Disadvantages
 Minimizes cost, complexity,
need for a user interface,
power consumption, and
weight of the device
 Smartphones are carried by
almost everyone
 The device can access apps
on smartphone
 Smartphones will often have
more computing power
than what might have
existed on the device
 Smartphones are not
standardized
 If smartphone is not
working (battery off) then
the device IoT
capabilities become
compromised
 Requires proximity to the
smartphone
 Security of device is
dependent on the
security of the
smartphone
 The cloud will act as the central connection
hub, power analytics and provision data
storage
◦ Rely on cloud resources to drive functionality and
data management
◦ Favored in the following industries
 Consumer-based IoT, if there is a stable Internet
connection (appliances)
 Enterprise environments such as offices may use cloud
– centric for coffee machines or photocopiers
Advantages Disadvantages
 Minimizes cost,
complexity, need for a
user interface, power
consumption, and
weight of device
 Well suited to deliver
“network level”
smartness
 Requires stable
connection to the
Internet
 High volume of data
being sent to the
cloud, increasing
communications cost
 Requires sharing of
data with the cloud,
which raises security
and privacy issues
 Devices are behind a firewall
 Little need to extend out to the external
Internet
 Ideal when few remote machines are
geographically outside of enterprise area
◦ Favored by the following industries
 Hospitals
 Industrial plants
Advantages Disadvantages
 Security and privacy
are better contained by
restricting Internet and
public cloud access
 Real time control and
monitoring are
enhanced if all
resources are nearby
 Not well suited where
many devices are
geographically
dispersed
 Benefits of the cloud
are lost
 All computing
resources and storage
must be local
 Folk, Chris. Hurley, Dan. Kaplow, Wesley. Payne, James. AFCEA International
Cyber Committee: The Security Implications of the Internet of Things
http://www.itworld.com/article/2906805/welcome-to-the-internet-of-things-
please-check-your-privacy-at-the-door.html
 Burnett, C.A. Internet of Things: Welcome to the Internet of Things. Please check
your privacy at the door
 Zanolli, Lauren. Welcome to privacy hell, also known as the Internet of Things.
http://www.fastcompany.com/3044046/tech-forecast/welcome-to-privacy-
hell-otherwise-known-as-the-internet-of-things
 Khan, Shabbi. http://www.manufacturingindustryadvisor.com/iot-designing-
privacy-and-security-into-devices/
 Tollefson, Rodika. http://thirdcertainty.com/news-analysis/internet-things-
facilitates-healthcare-data-breaches/
 Sabatino, Connor. http://www.autoindustrylawblog.com/2015/02/23/the-
internet-of-things-lessons-for-the-automotive-industry/

More Related Content

What's hot

IoT
IoTIoT
IoT
Mphasis
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
Somasundaram Jambunathan
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
European Union Agency for Network and Information Security (ENISA)
 
IoT - Apps & Services
IoT - Apps & ServicesIoT - Apps & Services
IoT - Apps & Services
Diogo Gomes
 
Iot architecture report
Iot architecture reportIot architecture report
Iot architecture report
Niranjan Kumar
 
Iot Overview
Iot Overview Iot Overview
Iot Overview
Kanagasundaram K PhD
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT Stack
PubNub
 
Data Privacy using IoTs in Smart Cities Project
 Data Privacy using IoTs in Smart Cities Project Data Privacy using IoTs in Smart Cities Project
Data Privacy using IoTs in Smart Cities Project
IndicThreads
 
Tips on designing for the Internet of Things
Tips on designing for the Internet of ThingsTips on designing for the Internet of Things
Tips on designing for the Internet of Things
Design World
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoT
Ahmed Banafa
 
10 myths about cloud computing
10 myths about cloud computing10 myths about cloud computing
10 myths about cloud computing
Ahmed Banafa
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your Data
InnoTech
 
Internet of everything ppt
Internet of everything pptInternet of everything ppt
Internet of everything ppt
Lavanya Sharma
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
Eurotech
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
 
1. Introduction to IoT
1. Introduction to IoT1. Introduction to IoT
1. Introduction to IoT
Abhishek Das
 
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoTAWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
Amazon Web Services
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
Eurotech
 
Artificial Intelligence in Computer Networks
Artificial Intelligence in Computer NetworksArtificial Intelligence in Computer Networks
Artificial Intelligence in Computer Networks
Abdullah Khosa
 
Introduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basicsIntroduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basics
Jaco Bester
 

What's hot (20)

IoT
IoTIoT
IoT
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
IoT - Apps & Services
IoT - Apps & ServicesIoT - Apps & Services
IoT - Apps & Services
 
Iot architecture report
Iot architecture reportIot architecture report
Iot architecture report
 
Iot Overview
Iot Overview Iot Overview
Iot Overview
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT Stack
 
Data Privacy using IoTs in Smart Cities Project
 Data Privacy using IoTs in Smart Cities Project Data Privacy using IoTs in Smart Cities Project
Data Privacy using IoTs in Smart Cities Project
 
Tips on designing for the Internet of Things
Tips on designing for the Internet of ThingsTips on designing for the Internet of Things
Tips on designing for the Internet of Things
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoT
 
10 myths about cloud computing
10 myths about cloud computing10 myths about cloud computing
10 myths about cloud computing
 
Getting More Value Out of Your Data
Getting More Value Out of Your DataGetting More Value Out of Your Data
Getting More Value Out of Your Data
 
Internet of everything ppt
Internet of everything pptInternet of everything ppt
Internet of everything ppt
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
1. Introduction to IoT
1. Introduction to IoT1. Introduction to IoT
1. Introduction to IoT
 
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoTAWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Artificial Intelligence in Computer Networks
Artificial Intelligence in Computer NetworksArtificial Intelligence in Computer Networks
Artificial Intelligence in Computer Networks
 
Introduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basicsIntroduction to IoT Technologies - The need to know basics
Introduction to IoT Technologies - The need to know basics
 

Viewers also liked

Why Drones are the Future of IoT
Why Drones are the Future of IoTWhy Drones are the Future of IoT
Why Drones are the Future of IoT
Colin Snow
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoT
Ahmed Banafa
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
MachinePulse
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Cisco Services
 
Internet of Things Architecture / Topology
Internet of Things Architecture / TopologyInternet of Things Architecture / Topology
Internet of Things Architecture / Topology
NEEVEE Technologies
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
Felix Grovit
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
Car Rental Companies In Qatar
Car Rental Companies In  QatarCar Rental Companies In  Qatar
Car Rental Companies In Qatar
qatpedia
 
Candidate presentation - Andrea Baldini PMP - 01-2017
Candidate presentation - Andrea Baldini PMP - 01-2017Candidate presentation - Andrea Baldini PMP - 01-2017
Candidate presentation - Andrea Baldini PMP - 01-2017Andrea Baldini
 
Microsoft dynamics gp
Microsoft dynamics gpMicrosoft dynamics gp
Microsoft dynamics gp
rai dastgeer
 
Mazen Albedah CV 18022016
Mazen Albedah CV 18022016Mazen Albedah CV 18022016
Mazen Albedah CV 18022016
Mazen Albedah
 
Ge cooley resume 1 29-2016
Ge cooley resume 1 29-2016Ge cooley resume 1 29-2016
Ge cooley resume 1 29-2016
Gar Cooley
 
Om0015 maintenance management
Om0015 maintenance managementOm0015 maintenance management
Om0015 maintenance management
consult4solutions
 
Calgary’s Attractions for You and Your Little Ones
Calgary’s Attractions for You and Your Little OnesCalgary’s Attractions for You and Your Little Ones
Calgary’s Attractions for You and Your Little Ones
Emily Mark
 
Resume 2016
Resume 2016Resume 2016
Resume 2016
Cheryl Roebuck
 
Mu0017 talent management and employee retention
Mu0017 talent management and employee retentionMu0017 talent management and employee retention
Mu0017 talent management and employee retention
consult4solutions
 
6. tres buenas prácticas agrícolas interrelacionadas que condicionan la produ...
6. tres buenas prácticas agrícolas interrelacionadas que condicionan la produ...6. tres buenas prácticas agrícolas interrelacionadas que condicionan la produ...
6. tres buenas prácticas agrícolas interrelacionadas que condicionan la produ...
Ana Martinez
 
ισοτητα τριγωνων
ισοτητα τριγωνωνισοτητα τριγωνων
ισοτητα τριγωνων
Athanasios Maroglou
 
first Michi
first Michifirst Michi
first Michi
Dawa Sherpa
 

Viewers also liked (20)

Why Drones are the Future of IoT
Why Drones are the Future of IoTWhy Drones are the Future of IoT
Why Drones are the Future of IoT
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoT
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things Architecture / Topology
Internet of Things Architecture / TopologyInternet of Things Architecture / Topology
Internet of Things Architecture / Topology
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Car Rental Companies In Qatar
Car Rental Companies In  QatarCar Rental Companies In  Qatar
Car Rental Companies In Qatar
 
Candidate presentation - Andrea Baldini PMP - 01-2017
Candidate presentation - Andrea Baldini PMP - 01-2017Candidate presentation - Andrea Baldini PMP - 01-2017
Candidate presentation - Andrea Baldini PMP - 01-2017
 
Microsoft dynamics gp
Microsoft dynamics gpMicrosoft dynamics gp
Microsoft dynamics gp
 
Mazen Albedah CV 18022016
Mazen Albedah CV 18022016Mazen Albedah CV 18022016
Mazen Albedah CV 18022016
 
Ge cooley resume 1 29-2016
Ge cooley resume 1 29-2016Ge cooley resume 1 29-2016
Ge cooley resume 1 29-2016
 
Om0015 maintenance management
Om0015 maintenance managementOm0015 maintenance management
Om0015 maintenance management
 
Calgary’s Attractions for You and Your Little Ones
Calgary’s Attractions for You and Your Little OnesCalgary’s Attractions for You and Your Little Ones
Calgary’s Attractions for You and Your Little Ones
 
Resume 2016
Resume 2016Resume 2016
Resume 2016
 
Mu0017 talent management and employee retention
Mu0017 talent management and employee retentionMu0017 talent management and employee retention
Mu0017 talent management and employee retention
 
6. tres buenas prácticas agrícolas interrelacionadas que condicionan la produ...
6. tres buenas prácticas agrícolas interrelacionadas que condicionan la produ...6. tres buenas prácticas agrícolas interrelacionadas que condicionan la produ...
6. tres buenas prácticas agrícolas interrelacionadas que condicionan la produ...
 
ισοτητα τριγωνων
ισοτητα τριγωνωνισοτητα τριγωνων
ισοτητα τριγωνων
 
first Michi
first Michifirst Michi
first Michi
 

Similar to IoT_Structure

IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
Somasundaram Jambunathan
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
divyabrahma1
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
Mayank Vijh
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
IRJET Journal
 
Mobile Devices and Wireless for teaching and stuyding pruposae
Mobile Devices and Wireless for teaching and stuyding pruposaeMobile Devices and Wireless for teaching and stuyding pruposae
Mobile Devices and Wireless for teaching and stuyding pruposae
ArfatAhmadKhan1
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
ezzAyman1
 
IoT.pptx
IoT.pptxIoT.pptx
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
Huntsman Security
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
Ahmed Banafa
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Iot Solution Development Platform
Iot Solution Development PlatformIot Solution Development Platform
Iot Solution Development Platform
Unmesh Ballal
 
IoT
IoTIoT
IoT
Mphasis
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
Symantec
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
IJCSIS Research Publications
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
Incubation & Industry
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
IRJET Journal
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
IRJET Journal
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
nadoje
 

Similar to IoT_Structure (20)

IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
Mobile Devices and Wireless for teaching and stuyding pruposae
Mobile Devices and Wireless for teaching and stuyding pruposaeMobile Devices and Wireless for teaching and stuyding pruposae
Mobile Devices and Wireless for teaching and stuyding pruposae
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Iot Solution Development Platform
Iot Solution Development PlatformIot Solution Development Platform
Iot Solution Development Platform
 
IoT
IoTIoT
IoT
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 

IoT_Structure

  • 2.  Internet of Things or IoT is a network of devices/objects that are interconnected, making them programmable, adaptable, and potentially capable of interacting with people  What led to the growth of IoT? ◦ IPv6’s huge increase in address space is a huge factor in the growth of IoT  “the address space expansion means that we could assign an IPv6 address to every atom on the surface of the earth and still have enough addresses left to do another 100+ earths.” – Steve Leibson
  • 3.  IoT devices collect information and can be invisible to the user/owner  Most IoT devices do not have a privacy policy and are not explicit on information they collect  IoT devices can serve as a place for hackers to launch attacks and gain access to information  According to a June 2014 report by Hewlett Packard, 7 out of 10 IoT devices have some kind of security flaw – with an average of 25 vulnerabilities per device
  • 4.  IoT devices in the medical field such as insulin pumps and MRI machines create more hackable access points. ◦ SANS Institute released study showing how 375 U.S. healthcare organizations were actively compromised between September 2012 and October 2013.  FitBit data has already been admitted into court in personal injury cases  Federal Trade Commission called for manufacturers to embed security in their IoT products  Massachusetts senator Ed Markey released results of his inquiry into the cybersecurity practices of major car manufacturers. He called security measures “inconsistent and incomplete”
  • 5.  Make sure companies add a privacy policy for IoT devices  Clearly explain and inform users of the information that is collected and risk involved  Companies/Agencies beginning to include IoT should have personnel that is trained to know the risk of IoT and security countermeasures to prevent potential breaches  Build security into devices from the start rather than near the end  Consider Data Minimization, which is limiting the amount of customer data that is collected
  • 6.  What are five traits to consider when implementing IoT? ◦ Privacy, Security, Cost, Level of Difficulty, and Performance  Thing-Centric  Gateway-Centric  Smartphone-Centric  Cloud-Centric  Enterprise-Centric
  • 7.  Things are smart on their own and store most of their data on-board. ◦ Communicate to the Internet only for centralized coordination and analysis ◦ Favored by  Construction  Agriculture  Utilities (infrastructure) and transportation ◦ Asset is remotely connected and is expensive/large enough to carry much of computing resource
  • 8. Advantages Disadvantages  Optimized for real-time onboard performance  Resilient to poor-quality connectivity  Offers improved security  Saves on communication data since data is selectively sent out or received  Cost and complexity are added to the thing and the edge of the network (undesirable if simplicity is important)  Design flaws can lead to devices/computing resources on islands  Requires specialized skills in the embedded and operational technologies, which may be hard to find
  • 9.  The gateway houses the application logic, stores data and communicates with the Internet for the things connected to it. ◦ Provides resources for devices ◦ Favored by  Building Systems  Utilities and Smart city assets (streetlights)  Requires most of the resources (user interface, app. Logic, data storage and analytics) are on the gateway
  • 10.
  • 11. Advantages Disadvantages  Removes the need for cost and complexity to exist on things and places it on gateway  Gateways can act as smarter portals to the Internet  Act as connector hub for devices  Act as IP address for all devices connected to it  Require an extra “tier” (gateway itself) to communicate with Internet (extra point of failure)  Require that cost and complexity reside on the gateway (cannot use the cloud)
  • 12.  Smartphone or any mobile device houses the application logic, stores data and communicates with the Internet for devices that are connected to it ◦ Things can be connected to the smartphone before they are connected to the Internet ◦ Smartphone serves as gateway to the Internet ◦ Favored by following industries  Wearable market (apple watch, fit bit)  Mobile health – monitoring equipment  Consumer home items (power tools, toys, appliances)
  • 13. Advantages Disadvantages  Minimizes cost, complexity, need for a user interface, power consumption, and weight of the device  Smartphones are carried by almost everyone  The device can access apps on smartphone  Smartphones will often have more computing power than what might have existed on the device  Smartphones are not standardized  If smartphone is not working (battery off) then the device IoT capabilities become compromised  Requires proximity to the smartphone  Security of device is dependent on the security of the smartphone
  • 14.  The cloud will act as the central connection hub, power analytics and provision data storage ◦ Rely on cloud resources to drive functionality and data management ◦ Favored in the following industries  Consumer-based IoT, if there is a stable Internet connection (appliances)  Enterprise environments such as offices may use cloud – centric for coffee machines or photocopiers
  • 15.
  • 16. Advantages Disadvantages  Minimizes cost, complexity, need for a user interface, power consumption, and weight of device  Well suited to deliver “network level” smartness  Requires stable connection to the Internet  High volume of data being sent to the cloud, increasing communications cost  Requires sharing of data with the cloud, which raises security and privacy issues
  • 17.  Devices are behind a firewall  Little need to extend out to the external Internet  Ideal when few remote machines are geographically outside of enterprise area ◦ Favored by the following industries  Hospitals  Industrial plants
  • 18.
  • 19. Advantages Disadvantages  Security and privacy are better contained by restricting Internet and public cloud access  Real time control and monitoring are enhanced if all resources are nearby  Not well suited where many devices are geographically dispersed  Benefits of the cloud are lost  All computing resources and storage must be local
  • 20.  Folk, Chris. Hurley, Dan. Kaplow, Wesley. Payne, James. AFCEA International Cyber Committee: The Security Implications of the Internet of Things http://www.itworld.com/article/2906805/welcome-to-the-internet-of-things- please-check-your-privacy-at-the-door.html  Burnett, C.A. Internet of Things: Welcome to the Internet of Things. Please check your privacy at the door  Zanolli, Lauren. Welcome to privacy hell, also known as the Internet of Things. http://www.fastcompany.com/3044046/tech-forecast/welcome-to-privacy- hell-otherwise-known-as-the-internet-of-things  Khan, Shabbi. http://www.manufacturingindustryadvisor.com/iot-designing- privacy-and-security-into-devices/  Tollefson, Rodika. http://thirdcertainty.com/news-analysis/internet-things- facilitates-healthcare-data-breaches/  Sabatino, Connor. http://www.autoindustrylawblog.com/2015/02/23/the- internet-of-things-lessons-for-the-automotive-industry/