SlideShare a Scribd company logo
1 of 27
SECURITY IN IoT
(Internet of Things)
PRESENTED BY:-
RAMNEEK KAUR
ME(CSE),Regular
152417 1
CONTENTS
• Internet of Things(IoT)
• IoT Devices
• IoT Technology
• OWASP Top 10 Security issues in IoT
• Security concerns
• Wireless Sensor Network(WSN)
• Attacks on WSN
• Devices under Attack
• Countermeasures
• Future Scope
• References 2
IoT diffusion-Forecast
• Welcome to the era of the Internet of Things (IoT), where digitally
connected devices are encroaching on every aspect of our lives, including
our homes, offices, cars and even our bodies.
• With the advent of IPv6 and Wi-Fi networks, IoT is growing at a dangerously
fast pace, and researchers estimate that by 2020, the number of active
wireless connected devices will exceed 50 billion.
3
IoT(Internet of Things)-
Definition
 IoT refers to the network of physical, Identifiable, objects connected
via the internet, which can sense and communicate.
 It is Ubiquitous-means anywhere, anytime, anyway, anything and
anyhow (5 A’s).
 IoT includes concepts such as Wireless Sensor Networks(WSN) ,
Machine-to-machine(M2M) communication and Low power Wireless
Personal Area Networks (LoWPAN) ,or technologies such as Radio-
Frequency Identification(RFID).
4
IoT devices
• Thermostat
• smoke detector
• Lockitron
• Smart baby monitor
• Philips Hue light bulb
• Air Quality egg
• Smart Body Analyzer
• In Home Health Care
5
IoT Technology
• Now that we all understand the IoT concept, it would be worthwhile
to deep dive in order to get familiar with the building blocks of IoT:
6
CONTINUE…
1) Sensors & Sensor technology – They will sniff a wide variety of
information ranging from Location, Weather/Environment conditions,
data to Health essentials of a patient.
2) IoT Gateways – IoT Gateways , as the name rightly suggests, are the
gateways to internet for all the things/devices that we want to interact
with. Gateways help to bridge the internal network of sensor nodes
with the external Internet or World Wide Web.
3) Cloud/server infrastructure & Big Data – The data transmitted
through gateway is stored & processed securely within the cloud
infrastructure using Big Data analytics engine. This processed data is
then used to perform intelligent actions that make all our devices
‘Smart Devices’!
7
CONTINUE…
4) End-user Mobile apps – The mobile apps will help end users to
control & monitor their devices from remote locations.
5) IPv6 – IP addresses are the backbone to the entire IoT ecosystem.
Internet.
• With IPv4 we were running out of IP addresses, but with IPv6
(launched in 2012) we now have 3.4*10^38 IP addresses!
8
Key Challenges of IoT
• Availability
• Architecture
• Reliability
• Mobility
• Performance
• Management
• Scalability
• Security & Privacy
-Security and Privacy is a significant challenge due to lack
of common standards and architecture for IoT security.
9
OWASP Top 10
1. Insecure Web Interface
2. Insufficient Authentication/Authorization
3. Insecure Network Services
4. Lack of Transport Encryption
5. Privacy Concerns
6. Insecure Cloud Interface
7. Insecure Mobile Interface
8. Insufficient Security Configurability
9. Insecure Software/Firmware
10. Poor Physical Security
10
IoT security concerns
1. Privacy Concerns: 90 percent of devices collected at least one
piece of personal information via the device, the cloud or the
device’s mobile application.
• information like name, address, date of birth or even health
and credit card information.
2. Insufficient Authentication/Authorization: 80 percent users
and devices rely on weak and simple passwords and
authorizations.
3. Transport Encryption: 70 percent of devices used
unencrypted network services. Transport encryption will be
crucial as most of the devices are transmitting data that most
people would consider crucial.
11
IoT security concerns
4. Web Interface: 60 percent raised security concerns with their
user interfaces. These issues included:
• persistent cross-site scripting, poor session management and
weak default credentials.
• From this, hackers were able to identify valid user accounts
and take them over using things like password reset features.
5. Insecure Software: 60 percent did not use encryption when
downloading software updates.
12
Wireless Sensor
Network(WSN)-
• Wireless sensor networks (WSN), sometimes called wireless
sensor and actuator networks (WSAN)
• The topology of the WSNs can vary from a simple star
network to an advanced multi-hop wireless mesh network.
• The propagation technique between the hops of the network
can be routing or flooding.
• Wireless Sensor Networks (WSNs) are playing more and more
a key role in several application scenarios such as healthcare,
agriculture, environment monitoring, and smart metering. 13
WSN- Architecture
14
WSNs are Vulnerable to
various types of Attacks
15
Attack Models
• Eavesdropping: an attacker intercepts packets transmitted over the
air for further cryptanalysis or traffic analysis.
• Traffic analysis: allows an attacker to determine that there is
activity in the network, the location of the BSs, and the type of
protocols being used.
• Message injection: an adversary injects bogus control information
into the data stream.
• Message modification: a previously captured message is modified
before being retransmitted
• Node capture: An embedded device is considered being
compromised when an attacker, through various means, gains
control to the node itself.
• Denial-of-Service (DoS) attacks: can be grouped into two categories
 Service degradation (e.g., collision attack), and
 Service disablement through power exhaustion (e.g. jamming)
16
Layer-based attack
categorization
17
Attacks in Wireless Sensor
Networks
• Selective forwarding
• Acknowledgement spoofing
• Wormhole Attack
• Sinkhole Attack
• Helloflood Attack
• Sybil Attack
18
• Selective forwarding: A malicious node refuses to forward all
or a subset of the packets it receives and simply drops them. If
a malicious node drops all the packets, the attack is then
called black hole.
• Acknowledgement spoofing: Spoof link layer
acknowledgements(ACKs) to trick other nodes to believe that
a link or node is either dead or alive.
Attacks in Wireless Sensor
Networks
19
Wormhole and Sinkhole
Attacks
• In Wormhole the attacker tunnels
the packets received at one
location of the network and
replays them in another
location.
• In Sinkhole node tries to attract
network traffic by advertise its
fake routing update.
• launch other attacks like :
selective forwarding attack
acknowledge spoofing attack
Wormhole Link
20
HELLO Flood Attack
• Every new node broadcasts “Hello messages” to find its
neighbors. Also, it broadcasts its route to the BS.
• Attacker with a high radio transmission range and processing
power sends HELLO packets to number of sensor nodes.
• Sensors are thus persuaded that
the attacker is their neighbor.
• Victim nodes try to go through
the attacker.
21
Sybil Attack
• “a malicious node illegitimately claims multiple identities”
• The Sybil attack can disrupt geographic and multi-path routing
protocols.
Adversary A at actual location (3,2) forges location advertisements for non-existent nodes A1, A2, and A3 as
well as advertising her own location. After hearing these advertisements, if B wants to send a
message to C: (0,2), it will attempt to do so through A3. This transmission can be overheard and
handled by the adversaryA.
22
Devices under Attack
• Smart Watch: Data sent between the Smart watch and an
Android mobile phone could be intercepted.
• Bluetooth communication between most Smart watches and
Android devices relies on a six digits PIN.
• Easy to crack with a brute-force attack.
• Smart Homes
• Smart Cars
• and many more…. 23
Overview of Countermeasures
• Confidentiality is provided through the use of encryption
technologies. Cryptographic algorithms such as the DES,
RSA are used to protect the secrecy of a message.
• MAC (Message Authentication Code) or Digital Signature
Algorithms(DSA) can be used to assure the recipient’s
integrity of the data and authenticity of the message
• Digital Signatures can be used to ensure non-repudiation.
• Availability can be achieved by adding redundant nodes. Multi
path and probabilistic routing can also be used to minimize
the impact of unavailability.
• Data freshness is ensured by adding a counter value in each
message. 24
Future Scope
• Identify vulnerabilities (e.g. replay attacks) in the proposed
authentication method and find solutions to them before
implementation.
• Further research and implementation of key exchanges
together with security protocols for IP-communication in
constrained networks.
• Lot of work can be done in this field as no efficient security
architecture for IoT is given yet.
25
References
• G. Padmavathi, D. Shanmugapriya,“A Survey of Attacks, Security
Mechanisms and Challenges in Wireless Sensor Networks”,
International Journal of Computer Science and Information Security,
IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
• https://en.wikipedia.org/wiki/Internet_of_Things
• https://www.owasp.org/index.php/OWASP_Internet_of_Things_Pro
ject
• http://www.cisco.com/c/en/us/about/security-center/secure-
iot-proposed-framework.html
26
27

More Related Content

What's hot

Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT SecuritySHAAMILIVARSAGV
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
Internet of Things Overview
Internet of Things OverviewInternet of Things Overview
Internet of Things OverviewRomin Irani
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Securitynoornabi16
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and SolutionsUlf Mattsson
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalEslam Nader
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Kunal Adhikari
 

What's hot (20)

Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Iot Security
Iot SecurityIot Security
Iot Security
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Internet of Things Overview
Internet of Things OverviewInternet of Things Overview
Internet of Things Overview
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
IoT Cloud Overview
IoT Cloud OverviewIoT Cloud Overview
IoT Cloud Overview
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 

Viewers also liked

IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay KumarOWASP Delhi
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamAmit Rohatgi
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iotST_World
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudAmazon Web Services
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT securityJulien Vermillard
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemKaspersky Lab
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
Sybil Attacks - MobiSys Seminar
Sybil Attacks - MobiSys SeminarSybil Attacks - MobiSys Seminar
Sybil Attacks - MobiSys SeminarNeal Lathia
 
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...Editor IJCATR
 
Network Information And Security
Network Information And SecurityNetwork Information And Security
Network Information And Securityanandk10
 

Viewers also liked (20)

IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
IOT - Presentation to PEP @ Progress
IOT - Presentation to PEP @ ProgressIOT - Presentation to PEP @ Progress
IOT - Presentation to PEP @ Progress
 
Sybil Attacks - MobiSys Seminar
Sybil Attacks - MobiSys SeminarSybil Attacks - MobiSys Seminar
Sybil Attacks - MobiSys Seminar
 
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
 
Network Information And Security
Network Information And SecurityNetwork Information And Security
Network Information And Security
 

Similar to Security in IoT

A survey in privacy security in IOT
A survey in privacy security in IOT A survey in privacy security in IOT
A survey in privacy security in IOT ssk
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
security in IOT.pptx
security in IOT.pptxsecurity in IOT.pptx
security in IOT.pptxTulasi72
 
Wireless security report
Wireless security reportWireless security report
Wireless security reportMarynol Cahinde
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
Copy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfCopy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfSeynji
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updatedskumartarget
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksIOSR Journals
 

Similar to Security in IoT (20)

A survey in privacy security in IOT
A survey in privacy security in IOT A survey in privacy security in IOT
A survey in privacy security in IOT
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Cyber security
Cyber securityCyber security
Cyber security
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
G011123539
G011123539G011123539
G011123539
 
security in IOT.pptx
security in IOT.pptxsecurity in IOT.pptx
security in IOT.pptx
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Copy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdfCopy of IoT Module 4-Security and privacy in IoT.pdf
Copy of IoT Module 4-Security and privacy in IoT.pdf
 
JCC_2015120915212763
JCC_2015120915212763JCC_2015120915212763
JCC_2015120915212763
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updated
 
The mfn 3
The mfn 3The mfn 3
The mfn 3
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
 
D0961927
D0961927D0961927
D0961927
 

Recently uploaded

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 

Recently uploaded (20)

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 

Security in IoT

  • 1. SECURITY IN IoT (Internet of Things) PRESENTED BY:- RAMNEEK KAUR ME(CSE),Regular 152417 1
  • 2. CONTENTS • Internet of Things(IoT) • IoT Devices • IoT Technology • OWASP Top 10 Security issues in IoT • Security concerns • Wireless Sensor Network(WSN) • Attacks on WSN • Devices under Attack • Countermeasures • Future Scope • References 2
  • 3. IoT diffusion-Forecast • Welcome to the era of the Internet of Things (IoT), where digitally connected devices are encroaching on every aspect of our lives, including our homes, offices, cars and even our bodies. • With the advent of IPv6 and Wi-Fi networks, IoT is growing at a dangerously fast pace, and researchers estimate that by 2020, the number of active wireless connected devices will exceed 50 billion. 3
  • 4. IoT(Internet of Things)- Definition  IoT refers to the network of physical, Identifiable, objects connected via the internet, which can sense and communicate.  It is Ubiquitous-means anywhere, anytime, anyway, anything and anyhow (5 A’s).  IoT includes concepts such as Wireless Sensor Networks(WSN) , Machine-to-machine(M2M) communication and Low power Wireless Personal Area Networks (LoWPAN) ,or technologies such as Radio- Frequency Identification(RFID). 4
  • 5. IoT devices • Thermostat • smoke detector • Lockitron • Smart baby monitor • Philips Hue light bulb • Air Quality egg • Smart Body Analyzer • In Home Health Care 5
  • 6. IoT Technology • Now that we all understand the IoT concept, it would be worthwhile to deep dive in order to get familiar with the building blocks of IoT: 6
  • 7. CONTINUE… 1) Sensors & Sensor technology – They will sniff a wide variety of information ranging from Location, Weather/Environment conditions, data to Health essentials of a patient. 2) IoT Gateways – IoT Gateways , as the name rightly suggests, are the gateways to internet for all the things/devices that we want to interact with. Gateways help to bridge the internal network of sensor nodes with the external Internet or World Wide Web. 3) Cloud/server infrastructure & Big Data – The data transmitted through gateway is stored & processed securely within the cloud infrastructure using Big Data analytics engine. This processed data is then used to perform intelligent actions that make all our devices ‘Smart Devices’! 7
  • 8. CONTINUE… 4) End-user Mobile apps – The mobile apps will help end users to control & monitor their devices from remote locations. 5) IPv6 – IP addresses are the backbone to the entire IoT ecosystem. Internet. • With IPv4 we were running out of IP addresses, but with IPv6 (launched in 2012) we now have 3.4*10^38 IP addresses! 8
  • 9. Key Challenges of IoT • Availability • Architecture • Reliability • Mobility • Performance • Management • Scalability • Security & Privacy -Security and Privacy is a significant challenge due to lack of common standards and architecture for IoT security. 9
  • 10. OWASP Top 10 1. Insecure Web Interface 2. Insufficient Authentication/Authorization 3. Insecure Network Services 4. Lack of Transport Encryption 5. Privacy Concerns 6. Insecure Cloud Interface 7. Insecure Mobile Interface 8. Insufficient Security Configurability 9. Insecure Software/Firmware 10. Poor Physical Security 10
  • 11. IoT security concerns 1. Privacy Concerns: 90 percent of devices collected at least one piece of personal information via the device, the cloud or the device’s mobile application. • information like name, address, date of birth or even health and credit card information. 2. Insufficient Authentication/Authorization: 80 percent users and devices rely on weak and simple passwords and authorizations. 3. Transport Encryption: 70 percent of devices used unencrypted network services. Transport encryption will be crucial as most of the devices are transmitting data that most people would consider crucial. 11
  • 12. IoT security concerns 4. Web Interface: 60 percent raised security concerns with their user interfaces. These issues included: • persistent cross-site scripting, poor session management and weak default credentials. • From this, hackers were able to identify valid user accounts and take them over using things like password reset features. 5. Insecure Software: 60 percent did not use encryption when downloading software updates. 12
  • 13. Wireless Sensor Network(WSN)- • Wireless sensor networks (WSN), sometimes called wireless sensor and actuator networks (WSAN) • The topology of the WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. • The propagation technique between the hops of the network can be routing or flooding. • Wireless Sensor Networks (WSNs) are playing more and more a key role in several application scenarios such as healthcare, agriculture, environment monitoring, and smart metering. 13
  • 15. WSNs are Vulnerable to various types of Attacks 15
  • 16. Attack Models • Eavesdropping: an attacker intercepts packets transmitted over the air for further cryptanalysis or traffic analysis. • Traffic analysis: allows an attacker to determine that there is activity in the network, the location of the BSs, and the type of protocols being used. • Message injection: an adversary injects bogus control information into the data stream. • Message modification: a previously captured message is modified before being retransmitted • Node capture: An embedded device is considered being compromised when an attacker, through various means, gains control to the node itself. • Denial-of-Service (DoS) attacks: can be grouped into two categories  Service degradation (e.g., collision attack), and  Service disablement through power exhaustion (e.g. jamming) 16
  • 18. Attacks in Wireless Sensor Networks • Selective forwarding • Acknowledgement spoofing • Wormhole Attack • Sinkhole Attack • Helloflood Attack • Sybil Attack 18
  • 19. • Selective forwarding: A malicious node refuses to forward all or a subset of the packets it receives and simply drops them. If a malicious node drops all the packets, the attack is then called black hole. • Acknowledgement spoofing: Spoof link layer acknowledgements(ACKs) to trick other nodes to believe that a link or node is either dead or alive. Attacks in Wireless Sensor Networks 19
  • 20. Wormhole and Sinkhole Attacks • In Wormhole the attacker tunnels the packets received at one location of the network and replays them in another location. • In Sinkhole node tries to attract network traffic by advertise its fake routing update. • launch other attacks like : selective forwarding attack acknowledge spoofing attack Wormhole Link 20
  • 21. HELLO Flood Attack • Every new node broadcasts “Hello messages” to find its neighbors. Also, it broadcasts its route to the BS. • Attacker with a high radio transmission range and processing power sends HELLO packets to number of sensor nodes. • Sensors are thus persuaded that the attacker is their neighbor. • Victim nodes try to go through the attacker. 21
  • 22. Sybil Attack • “a malicious node illegitimately claims multiple identities” • The Sybil attack can disrupt geographic and multi-path routing protocols. Adversary A at actual location (3,2) forges location advertisements for non-existent nodes A1, A2, and A3 as well as advertising her own location. After hearing these advertisements, if B wants to send a message to C: (0,2), it will attempt to do so through A3. This transmission can be overheard and handled by the adversaryA. 22
  • 23. Devices under Attack • Smart Watch: Data sent between the Smart watch and an Android mobile phone could be intercepted. • Bluetooth communication between most Smart watches and Android devices relies on a six digits PIN. • Easy to crack with a brute-force attack. • Smart Homes • Smart Cars • and many more…. 23
  • 24. Overview of Countermeasures • Confidentiality is provided through the use of encryption technologies. Cryptographic algorithms such as the DES, RSA are used to protect the secrecy of a message. • MAC (Message Authentication Code) or Digital Signature Algorithms(DSA) can be used to assure the recipient’s integrity of the data and authenticity of the message • Digital Signatures can be used to ensure non-repudiation. • Availability can be achieved by adding redundant nodes. Multi path and probabilistic routing can also be used to minimize the impact of unavailability. • Data freshness is ensured by adding a counter value in each message. 24
  • 25. Future Scope • Identify vulnerabilities (e.g. replay attacks) in the proposed authentication method and find solutions to them before implementation. • Further research and implementation of key exchanges together with security protocols for IP-communication in constrained networks. • Lot of work can be done in this field as no efficient security architecture for IoT is given yet. 25
  • 26. References • G. Padmavathi, D. Shanmugapriya,“A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks”, International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA • https://en.wikipedia.org/wiki/Internet_of_Things • https://www.owasp.org/index.php/OWASP_Internet_of_Things_Pro ject • http://www.cisco.com/c/en/us/about/security-center/secure- iot-proposed-framework.html 26
  • 27. 27

Editor's Notes

  1. ,are spatially distributed autonomous sensors to monitor physical or environmental conditions, such as: temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The current trend, however, is to move away from proprietary and closed standards, to embrace IP-based sensor networks using the emerging standard 6LoWPAN/IPv6. This allows native connectivity between WSN and Internet, enabling smart objects to participate to the Internet of Things (IoT).
  2. Eavesdropping is secretly listening to the private conversation of others without their consent