SlideShare a Scribd company logo
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 1
Security Requirements in IoT
Dr. Vrince Vimal
Computer Science and Engineering
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 2
Unit I 9 Hours
SecurityRequirements in IoT Architecture - Security in Enabling Technologies - Security Concerns in IoT Applications. Security
Architecture in the Internet of Things - Security Requirements in IoT - Insufficient Authentication/Authorization - Insecure Access
Control - Threats to Access Control, Privacy, and Availability - Attacks Specific to IoT. Vulnerabilities – Secrecy and Secret-Key Capacity -
Authentication/Authorization for Smart Devices - Transport Encryption – Attack & Fault trees.
Unit II 9 Hours
Cryptographic primitives and its role in IoT – Encryption and Decryption – Hashes – Digital Signatures – Random number generation –
Cipher suites– key management fundamentals – cryptographic controls built into IoT messaging and communication protocols – IoT Node
Authentication
Unit III 8 Hours
Identity lifecycle – authentication credentials – IoT IAM infrastructure – Authorization with Publish / Subscribe schemes – access control
Unit IV 6 Hours
Concerns in data dissemination – Lightweight and robust schemes for Privacy protection – Trust and Trust models for IoT – self-organizing
Things - Preventing unauthorized access
Unit V 8 Hours
Cloud services and IoT – offerings related to IoT from cloud service providers – Cloud IoT security controls – enterprise IoT cloud security
architecture – New directions in cloud enabled IoT computing.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 3
• The emerging Internet of Things (IoT) is believed to be the next
generation of the Internet.
• Easy target for Hackers as billion of devices Communicating
without human intervention.
• Intelligent sensors, wireless communication, networks, data
analysis technologies, cloud computing have been developed
• The development is in initial stages.
Introduction
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 4
• Security is significant obstacles in IoT
• It which involves the sensing of :
 Infrastructure security,
 Communication network security
 Application security
 General system security.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 5
• Security means cryptography, secure communication, and
privacy assurances.
• But for IoT Security has diverse meaning i.e.
• Data confidentiality,
• Services availability,
• Integrity,
• Antimalware,
• Information integrity,
• Privacy protection,
• Access control,
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 6
• At the lower layer of IoT (sensing layer)
 Limited computation capacity
 Limited energy supply
• At the Middle layer of IoT (network layer)
 Eavesdropping or Interception,
 Denial of service (DoS) attack.
• At the upper layer of IoT (application layer)
 Data aggregation and encryption compensates for
issues of all layers.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 7
Security Requirements
• In IoT, each connected device could be a potential doorway
into the IoT infrastructure or personal data.
• Security Concern would elevate once IoT reaches next level
of interoperability and autonomous decision making and
higher order security loopholes.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 8
Security Concerns in IoT
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 9
SECURITY REQUIREMENTS IN IoT
ARCHITECTURE
• A critical requirement of IoT is that the devices must be
interconnected.
• N/W has to acquire, process and communicate data from
real to virtual world.
• provide applications with strong security protection
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 10
• N/W must provide operational guarantees for the
IoT, which bridges the gap between the physical
devices and the virtual worlds.
• Framework should consider:
 Technical factors,
 Sensing techniques,
 Communication methods
 Network technologies
 Security protection,
 Information confidentiality,
 Transmission security,
 Privacy protection,
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 11
 Business issues,
 Business models,
 Business processes
• SoA has been successfully applied to IoT design
• The services-based application will heavily depend
on the architecture of IoT.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 12
SoA for IoT
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 13
Sensing Layer and IoT End-Nodes
For designing sensing layer of an IoT, the
main concerns are:
• Cost, size, resource, and energy
consumption
• Deployment.
• Heterogeneity.
• Communication.
• Networks.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 14
The endless variety of IoT applications poses
an equally wide variety of security challenges.
Devices authentication
Trusted devices
Leveraging the security controls and
availability of infrastructures in sensing layer.
In terms of software update
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 15
In this layer, the security concerns can be classified into two
main categories:
• The security requirements at IoT end-node: physically
;access control; authentication; nonrepudiation;
confidentiality; integrity; availability; and privacy.
• The security requirements in sensing layer: confidentiality;
data source authentication; device authentication; integrity;
availability, and timeless.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 16
Security Threats Description
Unauthorized access Due to physically capture or logic
attacked, the sensitive information at the end-nodes is captured
by the attacker.
Availability The end-node stops to work since physically
captured or attacked logically
Spoofing attack With malware node, the attacker
successfully masquerades as IoT end-device, end-node, or
end-gateway by falsifying data
Selfish threat Some IoT end-nodes stop working to save
resources or andwidth to cause the failure of network
Malicious code Virus, Trojan, and junk message that can
cause software failure
DoS An attempt to make a IoT end-node resource unavailable
to its users
Transmission threats Threats in transmission, such as
interrupting, blocking, data manipulation, forgery, etc.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 17
following actions should be taken:
(1) Implement security standards for IoT and ensure all
devices are produced by meeting specific security standards.
(2) Build trustworthy data sensing system and review the
security of all devices/ components.
(3) Forensically identify and trace the source of users.
(4) Software or firmware at IoT end-node should be securely
designed.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 18
In the networking layer, the following issues
should be addressed:
• Network management technologies
including the management for
fixed, wireless, mobile networks,
• Network energy efficiency,
• Requirements of QoS,
• Technologies for mining and searching,
• Information confidentiality,
• Security and privacy.
Network Layer
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 19
The security requirements in network layer involve:
• Overall security requirements,
• Privacy leakage:
• Communication security:
• Overconnected:
• MITM attack:
• Fake network message:
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 20
The activities in service layer, conducted by following
components:
• Service discovery.
• Service composition.
• Trustworthiness management.
• Service APIs.
Service Layer
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 21
The security requirements in the service layer include:
Authorization, service authentication, group authentication,
privacy protection, integrity, security of keys, nonrepudiation,
antireplay, availability, etc.
• Privacy leakage. The main concern in this layer involves
privacy leakage and malicious location tracking.
• Service abuses. In IoT the service abuse attack involves:
i) illegal abuse of services;
ii) abuse of unsubscribed services.
• Node identify masquerade.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 22
• DoS attack.
• Replay attack, the attacker resends the data.
• Service information sniffer and manipulation.
• Repudiation in service layer, it includes the communication
repudiation and services repudiation.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 23
For the application maintenance, following security
requirements will be involved:
• Remote safe configuration.
• Software downloading and updating.
• Security patches.
• Administrator authentication.
• Unified security platform, etc.
Application Layer
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 24
In IoT in designing the security solutions, following rules
should be helpful:
a. Since most constrained IoT end-nodes work in an
unattended manner, the designer should pay more attention
to the safety of these nodes;
b. As IoT involves billions of clustering nodes, the security
solutions should be designed based on energy efficiency
schemes;
c. The light security scheme at IoT end-nodes might be
different with existing network security solutions; however, we
should design security solutions in a big enough range for all
parts in IoT.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 25
 Security in Identification and Tracking Technologies
• Due to its capability for identifying, tracing, and tracking,
the RFID system has been wide applications
SECURITY IN ENABLING
TECHNOLOGIES
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 26
In general the security features of RFID include:
• Tags/Readers collision problem Data confidentiality
• Tag-to-reader authentication
• High-assurance readers
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 27
Security in Integration of WSN and RFID
• IoT with the integration of RIFD and WSNs makes it
possible to develop IoT applications for healthcare,
decision-making of complex systems.
• The security issue in integration of RFID and WSNs
involves following challenges:
• Privacy,
• Identification and authentication,
• Communication security,
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 28
• Trust and ownership,
•
• Integration;
• User authentication.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 29
SECURITY CONCERNS IN IoT
APPLICATIONS• The IoT enables information gathering, transmitting, and
storing to be available for devices in many scenarios, which
creates or accelerates many applications such as :
• Industrial control systems,
• Retailing industry,
• Smart shelf operations,
• Healthcare,
• Food and restaurant industry,
• Logistic industry, travel
• Tourism industry, etc.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 30
To integrate the devices of sensing layer as intrinsic parts of the IoT,
effective security technology is essential to ensure security and privacy
protection in
various activities such as :
• Personal activities,
• Business processes,
• Transportations,
• Information protection.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 31
Security Concerns in SCADA Systems
• SCADA systems are generally designed as more technical-
oriented solutions often in the industrial environment.
• Following security concerns are to be concerned while
integrating SCADA with IoT:
 Authentication and access control
 Identification of SCADA vulnerabilities
 Physical security
 System recovery and backups
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 32
Security Concerns in EIS
• Enterprise information systems have played the pivotal
role in modern organizations existing as Enterprise
Resource Planning (ERP) systems which integrated
• Intraorganizational business processes and
Supply chain management systems to link
Interorganizational business processes, and Customer
Relationship Management (CRM) systems that maintain
relationships with customers
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 33
Security Architecture in the Internet of Things
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 34
• The Internet of Things (IoT) is an extension of the
Internet
• The IoT is able to connect the digital cyberspace and real
physical space.
• IoT is able to introduce all the vulnerabilities of the digital
world into our real world.
• The success of IoT applications and IoT infrastructure
significantly depends on the guarantee of the security and
vulnerability in the IoT.
• It is important to set up and take cyber defense seriously.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 35
SECURITY REQUIREMENTS IN IoT
• The IoT introduces large quantities of new devices that will
be deployed or embedded throughout an organization or
even within a system.
• Each connected device could be a potential doorway into
the IoT infrastructure or personal data.
• Data captured from these devices can be analyzed and
acted upon.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 36
• Security Threats in IoT will reach new levels as
interoperability, mashups, and autonomous decision-
making begin to embed complexity, security loopholes.
• The sanctity of security and privacy concerns of the IoT
are not clearly defined yet.
• loopholes might cause potential “black swan” events.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 37
• In a general framework main security requirements
are addressed from six aspects:.
IoT Data Security Challenges
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 38
• Privacy risks will arise as objects within the IoT collect and
aggregate fragments of data that relate to their service
Data Confidentiality
• Insufficient authentication/authentication
• Insecure interfaces (web, mobile, cloud, etc.)
• Lack of transport encryption
• Confidentiality preserving & Access control
Privacy
• Privacy, data protection, & information security risk
management
• Privacy by design and default
• Data protection legislation
• Traceability/profiling/unlawful processing
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 39
Trust
• Identity management system
• Insecure software/firmware
• Ensuring continuity and availability of services
• Realization of malicious attacks against IoT devices and
system
• Loss of user control/difficult in making decision
• If we model IoT as 4 Layer architecture each layer should be
able to provide access control, device authentication, data
integrity, and confidentiality in transmission, availability, and
the ability to defend IoT devices against virus and attacks.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 40
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 41
Authentication in IoT
• The soul of IoT framework is the authentication layer.
(verify identity)
• When M2M devices need access to the IoT infrastructure,
the trust relationship is initiated based on the identity of
the device.
• In human and machine interactions names, patterns
fingerprints, retina scan passwords can authenticate.
• In M2M endpoints must be fingerprinted by means that
do not require human interaction.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 42
• SSL/TLS X.509 certificate is a digital file that's usable for
Secure Sockets Layer (SSL) or Transport Layer Security
(TLS). The certificate fulfills two functions. First, the
certificate can assist with authenticating and verifying the
identity of a host or site. Second, it enables the encryption
of information exchanged via a website.
• However, in the IoT domain, many devices may not have
enough memory to store a certificate.
• IEEE - 802.1X authentication involves three parties: a
supplicant, an authenticator, and an authentication server.
• TLS/DTLS , SSH, IPSec/IKE
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 43
Authorization
• The second layer of this framework is authorization that
controls a device’s access throughout the network fabric. This
layer builds upon the core authentication layer by leveraging
the identity information of an entity.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 44
Insufficient Authentication/Authorization
• On the Internet, the users are always authenticated by
requiring a password and browsers authenticate web sites
through the SSL (secure sockets layer protocol).
• In the IoT, new devices that connected into an IoT system
should be able to authenticate itself prior to receiving or
transmitting data.
• Deeply embedded devices often do not have users sitting
behind keyboards.
• Secure storage area plays important role.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 45
• Some new threats and attack vectors that malicious actors
could take advantage of are as follows:
In IoT-based industrial control system, such as SCADA etc.,:
• Control systems, vehicles, and even the human body
(WBAN) can be accessed and manipulated causing injury or
worse.
• Healthcare providers can improperly diagnose and treat
patients based on modified health information or
manipulated sensor data.
• Intruders can gain physical access to homes or commercial
businesses through attacks against electronic, remote
controlled door lock mechanisms.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 46
Individual
• Unauthorized tracking of people’s locations can occur
through usage pattern tracking based on asset usage time
and duration.
• Unlawful surveillance through persistent remote monitoring
capabilities offered by small-scale IoT devices.
• Inappropriate profiles and categorizations of individuals
can be created through examination of network and
geographic tracking and IoT metadata.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 47
Business Area
• Inappropriate profiles and categorizations of individuals
can be created through examination of network and
geographic tracking and IoT metadata.
• Manipulation of financial transactions through
unauthorized POS and POS access.
• Monetary loss arising from the inability to provide service.
• Vandalism, theft, or destruction of IoT assets that are
deployed in remote locations and lack physical security
controls.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 48
Ability to Access the IoT
• Ability to gain unauthorized access to IoT edge devices to
manipulate data by taking advantage of the challenges related
to updating software and firmware of embedded devices.
• Ability to gain unauthorized access to the Enterprise network
by compromising IoT edge devices and taking advantage of
trust relationships.
• Ability to create botnets by compromising large quantities of
IoT edge devices.
• Ability to impersonate IoT devices by gaining access to
keying material held in devices that rely up on software-based
trust stores.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 49
INSECURE ACCESS CONTROL
• Authorization frameworks for computer networks and
online services are role based. First, the identity of the user
is established and then his or her access privileges are
determined from the user’s role within an organization.
• E.g., RADIUS-Remote-Authentication Dial-In User Service.
• LDAP (Lightweight Directory Access Protocol)
• Role-Based Access Control Systems
• Access Control List-Based Systems
• Capability-Based Access
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 50
THREATS TO ACCESS CONTROL, PRIVACY,
AND AVAILABILITY
To secure devices access layer before users are at risk, following
actions should be taken:
(1)Implement security standards for IoT and ensure all devices
are produced by meeting specific security standards;
(2)Build trustworthy data sensing system and review the security
of all devices/components;
(3) Forensically identify and trace the source of users;
(4) Software or firmware at IoT end-node should be securely
designed.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 51
Security Threats and Vulnerabilities at IoT End-Node
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 52
ATTACKS SPECIFIC TO IoT
IoT applications might be subjected to most types of network
attacks, including :
Actually, more specific attacks to IoT have been emerged in
recently. Attackers can intercept or change the behavior of
smart home devices in many ways.
• Either by physical access
• Remote location
• Eavesdropping,
• Data modification
• Identity spoofing,
• Password-based attacks,
• DOS attack,
• Man-in-the-middle,
• Compromised-key attack,
• Sniffer attack
• Application layer attack
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 53
SECRECY AND SECRET-KEY CAPACITY
• The standardization of IoT is still an open issue.
• Available cryptography is designed at the application layer
without regard to the imperfections of the lower layer.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 54
IoT in Health care
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 55
One way Authentication
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 56
Mutual Authentication
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 57
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 58

More Related Content

What's hot

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
Security models
Security models Security models
Security models
LJ PROJECTS
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
MOHIT AGARWAL
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
Vishnupriya T H
 
Design challenges in IoT
Design challenges in IoT Design challenges in IoT
Design challenges in IoT
Emertxe Information Technologies Pvt Ltd
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
Eurotech
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
Ankur Kumar
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
Abdullah Alfadhly
 
IoT Security
IoT SecurityIoT Security
IoT Security
Peter Waher
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
University of Ontario Institute of Technology (UOIT)
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
Hitesh Mohapatra
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
CableLabs
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
noornabi16
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
SKS
 
IoT PPT
IoT PPTIoT PPT
IoT PPT
eduethics1
 

What's hot (20)

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Security models
Security models Security models
Security models
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Design challenges in IoT
Design challenges in IoT Design challenges in IoT
Design challenges in IoT
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
IoT PPT
IoT PPTIoT PPT
IoT PPT
 

Similar to Security Requirements in IoT Architecture

assignment help experts
assignment help expertsassignment help experts
assignment help experts
#essaywriting
 
sample assignment
sample assignmentsample assignment
sample assignment
#essaywriting
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
online Marketing
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
Skillmine Technology Consulting
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
pdevang
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
ijtsrd
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docx
alanfhall8953
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
Charles Li
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
IRJET Journal
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
IRJET Journal
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
IRJET Journal
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET Journal
 
A survey in privacy security in IOT
A survey in privacy security in IOT A survey in privacy security in IOT
A survey in privacy security in IOT
ssk
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
cyberprosocial
 

Similar to Security Requirements in IoT Architecture (20)

assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
sample assignment
sample assignmentsample assignment
sample assignment
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docx
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
 
A survey in privacy security in IOT
A survey in privacy security in IOT A survey in privacy security in IOT
A survey in privacy security in IOT
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
 

More from Vrince Vimal

Mac
MacMac
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor network
Vrince Vimal
 
GPS Orbits
GPS OrbitsGPS Orbits
GPS Orbits
Vrince Vimal
 
GPS processing techniques & some applications
GPS processing techniques & some applicationsGPS processing techniques & some applications
GPS processing techniques & some applicationsVrince Vimal
 
Equalisation, diversity, coding.
Equalisation, diversity, coding.Equalisation, diversity, coding.
Equalisation, diversity, coding.
Vrince Vimal
 
Cellular concepts
Cellular conceptsCellular concepts
Cellular concepts
Vrince Vimal
 
Basics of gps ii
Basics of gps  iiBasics of gps  ii
Basics of gps ii
Vrince Vimal
 
Basics of gps 1
Basics of gps 1Basics of gps 1
Basics of gps 1
Vrince Vimal
 
Small scale fading and multipath measurements
Small scale fading and multipath measurementsSmall scale fading and multipath measurements
Small scale fading and multipath measurements
Vrince Vimal
 
Large scale path loss 1
Large scale path loss 1Large scale path loss 1
Large scale path loss 1
Vrince Vimal
 

More from Vrince Vimal (11)

Mac
MacMac
Mac
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor network
 
GPS Orbits
GPS OrbitsGPS Orbits
GPS Orbits
 
GPS processing techniques & some applications
GPS processing techniques & some applicationsGPS processing techniques & some applications
GPS processing techniques & some applications
 
Gps measurements
Gps measurementsGps measurements
Gps measurements
 
Equalisation, diversity, coding.
Equalisation, diversity, coding.Equalisation, diversity, coding.
Equalisation, diversity, coding.
 
Cellular concepts
Cellular conceptsCellular concepts
Cellular concepts
 
Basics of gps ii
Basics of gps  iiBasics of gps  ii
Basics of gps ii
 
Basics of gps 1
Basics of gps 1Basics of gps 1
Basics of gps 1
 
Small scale fading and multipath measurements
Small scale fading and multipath measurementsSmall scale fading and multipath measurements
Small scale fading and multipath measurements
 
Large scale path loss 1
Large scale path loss 1Large scale path loss 1
Large scale path loss 1
 

Recently uploaded

LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 

Recently uploaded (20)

LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 

Security Requirements in IoT Architecture

  • 1. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 1 Security Requirements in IoT Dr. Vrince Vimal Computer Science and Engineering
  • 2. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 2 Unit I 9 Hours SecurityRequirements in IoT Architecture - Security in Enabling Technologies - Security Concerns in IoT Applications. Security Architecture in the Internet of Things - Security Requirements in IoT - Insufficient Authentication/Authorization - Insecure Access Control - Threats to Access Control, Privacy, and Availability - Attacks Specific to IoT. Vulnerabilities – Secrecy and Secret-Key Capacity - Authentication/Authorization for Smart Devices - Transport Encryption – Attack & Fault trees. Unit II 9 Hours Cryptographic primitives and its role in IoT – Encryption and Decryption – Hashes – Digital Signatures – Random number generation – Cipher suites– key management fundamentals – cryptographic controls built into IoT messaging and communication protocols – IoT Node Authentication Unit III 8 Hours Identity lifecycle – authentication credentials – IoT IAM infrastructure – Authorization with Publish / Subscribe schemes – access control Unit IV 6 Hours Concerns in data dissemination – Lightweight and robust schemes for Privacy protection – Trust and Trust models for IoT – self-organizing Things - Preventing unauthorized access Unit V 8 Hours Cloud services and IoT – offerings related to IoT from cloud service providers – Cloud IoT security controls – enterprise IoT cloud security architecture – New directions in cloud enabled IoT computing.
  • 3. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 3 • The emerging Internet of Things (IoT) is believed to be the next generation of the Internet. • Easy target for Hackers as billion of devices Communicating without human intervention. • Intelligent sensors, wireless communication, networks, data analysis technologies, cloud computing have been developed • The development is in initial stages. Introduction
  • 4. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 4 • Security is significant obstacles in IoT • It which involves the sensing of :  Infrastructure security,  Communication network security  Application security  General system security.
  • 5. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 5 • Security means cryptography, secure communication, and privacy assurances. • But for IoT Security has diverse meaning i.e. • Data confidentiality, • Services availability, • Integrity, • Antimalware, • Information integrity, • Privacy protection, • Access control,
  • 6. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 6 • At the lower layer of IoT (sensing layer)  Limited computation capacity  Limited energy supply • At the Middle layer of IoT (network layer)  Eavesdropping or Interception,  Denial of service (DoS) attack. • At the upper layer of IoT (application layer)  Data aggregation and encryption compensates for issues of all layers.
  • 7. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 7 Security Requirements • In IoT, each connected device could be a potential doorway into the IoT infrastructure or personal data. • Security Concern would elevate once IoT reaches next level of interoperability and autonomous decision making and higher order security loopholes.
  • 8. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 8 Security Concerns in IoT
  • 9. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 9 SECURITY REQUIREMENTS IN IoT ARCHITECTURE • A critical requirement of IoT is that the devices must be interconnected. • N/W has to acquire, process and communicate data from real to virtual world. • provide applications with strong security protection
  • 10. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 10 • N/W must provide operational guarantees for the IoT, which bridges the gap between the physical devices and the virtual worlds. • Framework should consider:  Technical factors,  Sensing techniques,  Communication methods  Network technologies  Security protection,  Information confidentiality,  Transmission security,  Privacy protection,
  • 11. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 11  Business issues,  Business models,  Business processes • SoA has been successfully applied to IoT design • The services-based application will heavily depend on the architecture of IoT.
  • 12. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 12 SoA for IoT
  • 13. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 13 Sensing Layer and IoT End-Nodes For designing sensing layer of an IoT, the main concerns are: • Cost, size, resource, and energy consumption • Deployment. • Heterogeneity. • Communication. • Networks.
  • 14. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 14 The endless variety of IoT applications poses an equally wide variety of security challenges. Devices authentication Trusted devices Leveraging the security controls and availability of infrastructures in sensing layer. In terms of software update
  • 15. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 15 In this layer, the security concerns can be classified into two main categories: • The security requirements at IoT end-node: physically ;access control; authentication; nonrepudiation; confidentiality; integrity; availability; and privacy. • The security requirements in sensing layer: confidentiality; data source authentication; device authentication; integrity; availability, and timeless.
  • 16. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 16 Security Threats Description Unauthorized access Due to physically capture or logic attacked, the sensitive information at the end-nodes is captured by the attacker. Availability The end-node stops to work since physically captured or attacked logically Spoofing attack With malware node, the attacker successfully masquerades as IoT end-device, end-node, or end-gateway by falsifying data Selfish threat Some IoT end-nodes stop working to save resources or andwidth to cause the failure of network Malicious code Virus, Trojan, and junk message that can cause software failure DoS An attempt to make a IoT end-node resource unavailable to its users Transmission threats Threats in transmission, such as interrupting, blocking, data manipulation, forgery, etc.
  • 17. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 17 following actions should be taken: (1) Implement security standards for IoT and ensure all devices are produced by meeting specific security standards. (2) Build trustworthy data sensing system and review the security of all devices/ components. (3) Forensically identify and trace the source of users. (4) Software or firmware at IoT end-node should be securely designed.
  • 18. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 18 In the networking layer, the following issues should be addressed: • Network management technologies including the management for fixed, wireless, mobile networks, • Network energy efficiency, • Requirements of QoS, • Technologies for mining and searching, • Information confidentiality, • Security and privacy. Network Layer
  • 19. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 19 The security requirements in network layer involve: • Overall security requirements, • Privacy leakage: • Communication security: • Overconnected: • MITM attack: • Fake network message:
  • 20. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 20 The activities in service layer, conducted by following components: • Service discovery. • Service composition. • Trustworthiness management. • Service APIs. Service Layer
  • 21. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 21 The security requirements in the service layer include: Authorization, service authentication, group authentication, privacy protection, integrity, security of keys, nonrepudiation, antireplay, availability, etc. • Privacy leakage. The main concern in this layer involves privacy leakage and malicious location tracking. • Service abuses. In IoT the service abuse attack involves: i) illegal abuse of services; ii) abuse of unsubscribed services. • Node identify masquerade.
  • 22. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 22 • DoS attack. • Replay attack, the attacker resends the data. • Service information sniffer and manipulation. • Repudiation in service layer, it includes the communication repudiation and services repudiation.
  • 23. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 23 For the application maintenance, following security requirements will be involved: • Remote safe configuration. • Software downloading and updating. • Security patches. • Administrator authentication. • Unified security platform, etc. Application Layer
  • 24. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 24 In IoT in designing the security solutions, following rules should be helpful: a. Since most constrained IoT end-nodes work in an unattended manner, the designer should pay more attention to the safety of these nodes; b. As IoT involves billions of clustering nodes, the security solutions should be designed based on energy efficiency schemes; c. The light security scheme at IoT end-nodes might be different with existing network security solutions; however, we should design security solutions in a big enough range for all parts in IoT.
  • 25. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 25  Security in Identification and Tracking Technologies • Due to its capability for identifying, tracing, and tracking, the RFID system has been wide applications SECURITY IN ENABLING TECHNOLOGIES
  • 26. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 26 In general the security features of RFID include: • Tags/Readers collision problem Data confidentiality • Tag-to-reader authentication • High-assurance readers
  • 27. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 27 Security in Integration of WSN and RFID • IoT with the integration of RIFD and WSNs makes it possible to develop IoT applications for healthcare, decision-making of complex systems. • The security issue in integration of RFID and WSNs involves following challenges: • Privacy, • Identification and authentication, • Communication security,
  • 28. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 28 • Trust and ownership, • • Integration; • User authentication.
  • 29. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 29 SECURITY CONCERNS IN IoT APPLICATIONS• The IoT enables information gathering, transmitting, and storing to be available for devices in many scenarios, which creates or accelerates many applications such as : • Industrial control systems, • Retailing industry, • Smart shelf operations, • Healthcare, • Food and restaurant industry, • Logistic industry, travel • Tourism industry, etc.
  • 30. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 30 To integrate the devices of sensing layer as intrinsic parts of the IoT, effective security technology is essential to ensure security and privacy protection in various activities such as : • Personal activities, • Business processes, • Transportations, • Information protection.
  • 31. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 31 Security Concerns in SCADA Systems • SCADA systems are generally designed as more technical- oriented solutions often in the industrial environment. • Following security concerns are to be concerned while integrating SCADA with IoT:  Authentication and access control  Identification of SCADA vulnerabilities  Physical security  System recovery and backups
  • 32. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 32 Security Concerns in EIS • Enterprise information systems have played the pivotal role in modern organizations existing as Enterprise Resource Planning (ERP) systems which integrated • Intraorganizational business processes and Supply chain management systems to link Interorganizational business processes, and Customer Relationship Management (CRM) systems that maintain relationships with customers
  • 33. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 33 Security Architecture in the Internet of Things
  • 34. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 34 • The Internet of Things (IoT) is an extension of the Internet • The IoT is able to connect the digital cyberspace and real physical space. • IoT is able to introduce all the vulnerabilities of the digital world into our real world. • The success of IoT applications and IoT infrastructure significantly depends on the guarantee of the security and vulnerability in the IoT. • It is important to set up and take cyber defense seriously.
  • 35. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 35 SECURITY REQUIREMENTS IN IoT • The IoT introduces large quantities of new devices that will be deployed or embedded throughout an organization or even within a system. • Each connected device could be a potential doorway into the IoT infrastructure or personal data. • Data captured from these devices can be analyzed and acted upon.
  • 36. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 36 • Security Threats in IoT will reach new levels as interoperability, mashups, and autonomous decision- making begin to embed complexity, security loopholes. • The sanctity of security and privacy concerns of the IoT are not clearly defined yet. • loopholes might cause potential “black swan” events.
  • 37. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 37 • In a general framework main security requirements are addressed from six aspects:. IoT Data Security Challenges
  • 38. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 38 • Privacy risks will arise as objects within the IoT collect and aggregate fragments of data that relate to their service Data Confidentiality • Insufficient authentication/authentication • Insecure interfaces (web, mobile, cloud, etc.) • Lack of transport encryption • Confidentiality preserving & Access control Privacy • Privacy, data protection, & information security risk management • Privacy by design and default • Data protection legislation • Traceability/profiling/unlawful processing
  • 39. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 39 Trust • Identity management system • Insecure software/firmware • Ensuring continuity and availability of services • Realization of malicious attacks against IoT devices and system • Loss of user control/difficult in making decision • If we model IoT as 4 Layer architecture each layer should be able to provide access control, device authentication, data integrity, and confidentiality in transmission, availability, and the ability to defend IoT devices against virus and attacks.
  • 40. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 40
  • 41. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 41 Authentication in IoT • The soul of IoT framework is the authentication layer. (verify identity) • When M2M devices need access to the IoT infrastructure, the trust relationship is initiated based on the identity of the device. • In human and machine interactions names, patterns fingerprints, retina scan passwords can authenticate. • In M2M endpoints must be fingerprinted by means that do not require human interaction.
  • 42. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 42 • SSL/TLS X.509 certificate is a digital file that's usable for Secure Sockets Layer (SSL) or Transport Layer Security (TLS). The certificate fulfills two functions. First, the certificate can assist with authenticating and verifying the identity of a host or site. Second, it enables the encryption of information exchanged via a website. • However, in the IoT domain, many devices may not have enough memory to store a certificate. • IEEE - 802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. • TLS/DTLS , SSH, IPSec/IKE
  • 43. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 43 Authorization • The second layer of this framework is authorization that controls a device’s access throughout the network fabric. This layer builds upon the core authentication layer by leveraging the identity information of an entity.
  • 44. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 44 Insufficient Authentication/Authorization • On the Internet, the users are always authenticated by requiring a password and browsers authenticate web sites through the SSL (secure sockets layer protocol). • In the IoT, new devices that connected into an IoT system should be able to authenticate itself prior to receiving or transmitting data. • Deeply embedded devices often do not have users sitting behind keyboards. • Secure storage area plays important role.
  • 45. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 45 • Some new threats and attack vectors that malicious actors could take advantage of are as follows: In IoT-based industrial control system, such as SCADA etc.,: • Control systems, vehicles, and even the human body (WBAN) can be accessed and manipulated causing injury or worse. • Healthcare providers can improperly diagnose and treat patients based on modified health information or manipulated sensor data. • Intruders can gain physical access to homes or commercial businesses through attacks against electronic, remote controlled door lock mechanisms.
  • 46. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 46 Individual • Unauthorized tracking of people’s locations can occur through usage pattern tracking based on asset usage time and duration. • Unlawful surveillance through persistent remote monitoring capabilities offered by small-scale IoT devices. • Inappropriate profiles and categorizations of individuals can be created through examination of network and geographic tracking and IoT metadata.
  • 47. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 47 Business Area • Inappropriate profiles and categorizations of individuals can be created through examination of network and geographic tracking and IoT metadata. • Manipulation of financial transactions through unauthorized POS and POS access. • Monetary loss arising from the inability to provide service. • Vandalism, theft, or destruction of IoT assets that are deployed in remote locations and lack physical security controls.
  • 48. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 48 Ability to Access the IoT • Ability to gain unauthorized access to IoT edge devices to manipulate data by taking advantage of the challenges related to updating software and firmware of embedded devices. • Ability to gain unauthorized access to the Enterprise network by compromising IoT edge devices and taking advantage of trust relationships. • Ability to create botnets by compromising large quantities of IoT edge devices. • Ability to impersonate IoT devices by gaining access to keying material held in devices that rely up on software-based trust stores.
  • 49. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 49 INSECURE ACCESS CONTROL • Authorization frameworks for computer networks and online services are role based. First, the identity of the user is established and then his or her access privileges are determined from the user’s role within an organization. • E.g., RADIUS-Remote-Authentication Dial-In User Service. • LDAP (Lightweight Directory Access Protocol) • Role-Based Access Control Systems • Access Control List-Based Systems • Capability-Based Access
  • 50. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 50 THREATS TO ACCESS CONTROL, PRIVACY, AND AVAILABILITY To secure devices access layer before users are at risk, following actions should be taken: (1)Implement security standards for IoT and ensure all devices are produced by meeting specific security standards; (2)Build trustworthy data sensing system and review the security of all devices/components; (3) Forensically identify and trace the source of users; (4) Software or firmware at IoT end-node should be securely designed.
  • 51. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 51 Security Threats and Vulnerabilities at IoT End-Node
  • 52. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 52 ATTACKS SPECIFIC TO IoT IoT applications might be subjected to most types of network attacks, including : Actually, more specific attacks to IoT have been emerged in recently. Attackers can intercept or change the behavior of smart home devices in many ways. • Either by physical access • Remote location • Eavesdropping, • Data modification • Identity spoofing, • Password-based attacks, • DOS attack, • Man-in-the-middle, • Compromised-key attack, • Sniffer attack • Application layer attack
  • 53. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 53 SECRECY AND SECRET-KEY CAPACITY • The standardization of IoT is still an open issue. • Available cryptography is designed at the application layer without regard to the imperfections of the lower layer.
  • 54. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 54 IoT in Health care
  • 55. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 55 One way Authentication
  • 56. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 56 Mutual Authentication
  • 57. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 57
  • 58. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 58