SlideShare a Scribd company logo
1 of 58
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 1
Security Requirements in IoT
Dr. Vrince Vimal
Computer Science and Engineering
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 2
Unit I 9 Hours
SecurityRequirements in IoT Architecture - Security in Enabling Technologies - Security Concerns in IoT Applications. Security
Architecture in the Internet of Things - Security Requirements in IoT - Insufficient Authentication/Authorization - Insecure Access
Control - Threats to Access Control, Privacy, and Availability - Attacks Specific to IoT. Vulnerabilities – Secrecy and Secret-Key Capacity -
Authentication/Authorization for Smart Devices - Transport Encryption – Attack & Fault trees.
Unit II 9 Hours
Cryptographic primitives and its role in IoT – Encryption and Decryption – Hashes – Digital Signatures – Random number generation –
Cipher suites– key management fundamentals – cryptographic controls built into IoT messaging and communication protocols – IoT Node
Authentication
Unit III 8 Hours
Identity lifecycle – authentication credentials – IoT IAM infrastructure – Authorization with Publish / Subscribe schemes – access control
Unit IV 6 Hours
Concerns in data dissemination – Lightweight and robust schemes for Privacy protection – Trust and Trust models for IoT – self-organizing
Things - Preventing unauthorized access
Unit V 8 Hours
Cloud services and IoT – offerings related to IoT from cloud service providers – Cloud IoT security controls – enterprise IoT cloud security
architecture – New directions in cloud enabled IoT computing.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 3
• The emerging Internet of Things (IoT) is believed to be the next
generation of the Internet.
• Easy target for Hackers as billion of devices Communicating
without human intervention.
• Intelligent sensors, wireless communication, networks, data
analysis technologies, cloud computing have been developed
• The development is in initial stages.
Introduction
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 4
• Security is significant obstacles in IoT
• It which involves the sensing of :
 Infrastructure security,
 Communication network security
 Application security
 General system security.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 5
• Security means cryptography, secure communication, and
privacy assurances.
• But for IoT Security has diverse meaning i.e.
• Data confidentiality,
• Services availability,
• Integrity,
• Antimalware,
• Information integrity,
• Privacy protection,
• Access control,
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 6
• At the lower layer of IoT (sensing layer)
 Limited computation capacity
 Limited energy supply
• At the Middle layer of IoT (network layer)
 Eavesdropping or Interception,
 Denial of service (DoS) attack.
• At the upper layer of IoT (application layer)
 Data aggregation and encryption compensates for
issues of all layers.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 7
Security Requirements
• In IoT, each connected device could be a potential doorway
into the IoT infrastructure or personal data.
• Security Concern would elevate once IoT reaches next level
of interoperability and autonomous decision making and
higher order security loopholes.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 8
Security Concerns in IoT
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 9
SECURITY REQUIREMENTS IN IoT
ARCHITECTURE
• A critical requirement of IoT is that the devices must be
interconnected.
• N/W has to acquire, process and communicate data from
real to virtual world.
• provide applications with strong security protection
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 10
• N/W must provide operational guarantees for the
IoT, which bridges the gap between the physical
devices and the virtual worlds.
• Framework should consider:
 Technical factors,
 Sensing techniques,
 Communication methods
 Network technologies
 Security protection,
 Information confidentiality,
 Transmission security,
 Privacy protection,
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 11
 Business issues,
 Business models,
 Business processes
• SoA has been successfully applied to IoT design
• The services-based application will heavily depend
on the architecture of IoT.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 12
SoA for IoT
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 13
Sensing Layer and IoT End-Nodes
For designing sensing layer of an IoT, the
main concerns are:
• Cost, size, resource, and energy
consumption
• Deployment.
• Heterogeneity.
• Communication.
• Networks.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 14
The endless variety of IoT applications poses
an equally wide variety of security challenges.
Devices authentication
Trusted devices
Leveraging the security controls and
availability of infrastructures in sensing layer.
In terms of software update
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 15
In this layer, the security concerns can be classified into two
main categories:
• The security requirements at IoT end-node: physically
;access control; authentication; nonrepudiation;
confidentiality; integrity; availability; and privacy.
• The security requirements in sensing layer: confidentiality;
data source authentication; device authentication; integrity;
availability, and timeless.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 16
Security Threats Description
Unauthorized access Due to physically capture or logic
attacked, the sensitive information at the end-nodes is captured
by the attacker.
Availability The end-node stops to work since physically
captured or attacked logically
Spoofing attack With malware node, the attacker
successfully masquerades as IoT end-device, end-node, or
end-gateway by falsifying data
Selfish threat Some IoT end-nodes stop working to save
resources or andwidth to cause the failure of network
Malicious code Virus, Trojan, and junk message that can
cause software failure
DoS An attempt to make a IoT end-node resource unavailable
to its users
Transmission threats Threats in transmission, such as
interrupting, blocking, data manipulation, forgery, etc.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 17
following actions should be taken:
(1) Implement security standards for IoT and ensure all
devices are produced by meeting specific security standards.
(2) Build trustworthy data sensing system and review the
security of all devices/ components.
(3) Forensically identify and trace the source of users.
(4) Software or firmware at IoT end-node should be securely
designed.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 18
In the networking layer, the following issues
should be addressed:
• Network management technologies
including the management for
fixed, wireless, mobile networks,
• Network energy efficiency,
• Requirements of QoS,
• Technologies for mining and searching,
• Information confidentiality,
• Security and privacy.
Network Layer
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 19
The security requirements in network layer involve:
• Overall security requirements,
• Privacy leakage:
• Communication security:
• Overconnected:
• MITM attack:
• Fake network message:
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 20
The activities in service layer, conducted by following
components:
• Service discovery.
• Service composition.
• Trustworthiness management.
• Service APIs.
Service Layer
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 21
The security requirements in the service layer include:
Authorization, service authentication, group authentication,
privacy protection, integrity, security of keys, nonrepudiation,
antireplay, availability, etc.
• Privacy leakage. The main concern in this layer involves
privacy leakage and malicious location tracking.
• Service abuses. In IoT the service abuse attack involves:
i) illegal abuse of services;
ii) abuse of unsubscribed services.
• Node identify masquerade.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 22
• DoS attack.
• Replay attack, the attacker resends the data.
• Service information sniffer and manipulation.
• Repudiation in service layer, it includes the communication
repudiation and services repudiation.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 23
For the application maintenance, following security
requirements will be involved:
• Remote safe configuration.
• Software downloading and updating.
• Security patches.
• Administrator authentication.
• Unified security platform, etc.
Application Layer
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 24
In IoT in designing the security solutions, following rules
should be helpful:
a. Since most constrained IoT end-nodes work in an
unattended manner, the designer should pay more attention
to the safety of these nodes;
b. As IoT involves billions of clustering nodes, the security
solutions should be designed based on energy efficiency
schemes;
c. The light security scheme at IoT end-nodes might be
different with existing network security solutions; however, we
should design security solutions in a big enough range for all
parts in IoT.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 25
 Security in Identification and Tracking Technologies
• Due to its capability for identifying, tracing, and tracking,
the RFID system has been wide applications
SECURITY IN ENABLING
TECHNOLOGIES
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 26
In general the security features of RFID include:
• Tags/Readers collision problem Data confidentiality
• Tag-to-reader authentication
• High-assurance readers
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 27
Security in Integration of WSN and RFID
• IoT with the integration of RIFD and WSNs makes it
possible to develop IoT applications for healthcare,
decision-making of complex systems.
• The security issue in integration of RFID and WSNs
involves following challenges:
• Privacy,
• Identification and authentication,
• Communication security,
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 28
• Trust and ownership,
•
• Integration;
• User authentication.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 29
SECURITY CONCERNS IN IoT
APPLICATIONS• The IoT enables information gathering, transmitting, and
storing to be available for devices in many scenarios, which
creates or accelerates many applications such as :
• Industrial control systems,
• Retailing industry,
• Smart shelf operations,
• Healthcare,
• Food and restaurant industry,
• Logistic industry, travel
• Tourism industry, etc.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 30
To integrate the devices of sensing layer as intrinsic parts of the IoT,
effective security technology is essential to ensure security and privacy
protection in
various activities such as :
• Personal activities,
• Business processes,
• Transportations,
• Information protection.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 31
Security Concerns in SCADA Systems
• SCADA systems are generally designed as more technical-
oriented solutions often in the industrial environment.
• Following security concerns are to be concerned while
integrating SCADA with IoT:
 Authentication and access control
 Identification of SCADA vulnerabilities
 Physical security
 System recovery and backups
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 32
Security Concerns in EIS
• Enterprise information systems have played the pivotal
role in modern organizations existing as Enterprise
Resource Planning (ERP) systems which integrated
• Intraorganizational business processes and
Supply chain management systems to link
Interorganizational business processes, and Customer
Relationship Management (CRM) systems that maintain
relationships with customers
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 33
Security Architecture in the Internet of Things
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 34
• The Internet of Things (IoT) is an extension of the
Internet
• The IoT is able to connect the digital cyberspace and real
physical space.
• IoT is able to introduce all the vulnerabilities of the digital
world into our real world.
• The success of IoT applications and IoT infrastructure
significantly depends on the guarantee of the security and
vulnerability in the IoT.
• It is important to set up and take cyber defense seriously.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 35
SECURITY REQUIREMENTS IN IoT
• The IoT introduces large quantities of new devices that will
be deployed or embedded throughout an organization or
even within a system.
• Each connected device could be a potential doorway into
the IoT infrastructure or personal data.
• Data captured from these devices can be analyzed and
acted upon.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 36
• Security Threats in IoT will reach new levels as
interoperability, mashups, and autonomous decision-
making begin to embed complexity, security loopholes.
• The sanctity of security and privacy concerns of the IoT
are not clearly defined yet.
• loopholes might cause potential “black swan” events.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 37
• In a general framework main security requirements
are addressed from six aspects:.
IoT Data Security Challenges
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 38
• Privacy risks will arise as objects within the IoT collect and
aggregate fragments of data that relate to their service
Data Confidentiality
• Insufficient authentication/authentication
• Insecure interfaces (web, mobile, cloud, etc.)
• Lack of transport encryption
• Confidentiality preserving & Access control
Privacy
• Privacy, data protection, & information security risk
management
• Privacy by design and default
• Data protection legislation
• Traceability/profiling/unlawful processing
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 39
Trust
• Identity management system
• Insecure software/firmware
• Ensuring continuity and availability of services
• Realization of malicious attacks against IoT devices and
system
• Loss of user control/difficult in making decision
• If we model IoT as 4 Layer architecture each layer should be
able to provide access control, device authentication, data
integrity, and confidentiality in transmission, availability, and
the ability to defend IoT devices against virus and attacks.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 40
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 41
Authentication in IoT
• The soul of IoT framework is the authentication layer.
(verify identity)
• When M2M devices need access to the IoT infrastructure,
the trust relationship is initiated based on the identity of
the device.
• In human and machine interactions names, patterns
fingerprints, retina scan passwords can authenticate.
• In M2M endpoints must be fingerprinted by means that
do not require human interaction.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 42
• SSL/TLS X.509 certificate is a digital file that's usable for
Secure Sockets Layer (SSL) or Transport Layer Security
(TLS). The certificate fulfills two functions. First, the
certificate can assist with authenticating and verifying the
identity of a host or site. Second, it enables the encryption
of information exchanged via a website.
• However, in the IoT domain, many devices may not have
enough memory to store a certificate.
• IEEE - 802.1X authentication involves three parties: a
supplicant, an authenticator, and an authentication server.
• TLS/DTLS , SSH, IPSec/IKE
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 43
Authorization
• The second layer of this framework is authorization that
controls a device’s access throughout the network fabric. This
layer builds upon the core authentication layer by leveraging
the identity information of an entity.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 44
Insufficient Authentication/Authorization
• On the Internet, the users are always authenticated by
requiring a password and browsers authenticate web sites
through the SSL (secure sockets layer protocol).
• In the IoT, new devices that connected into an IoT system
should be able to authenticate itself prior to receiving or
transmitting data.
• Deeply embedded devices often do not have users sitting
behind keyboards.
• Secure storage area plays important role.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 45
• Some new threats and attack vectors that malicious actors
could take advantage of are as follows:
In IoT-based industrial control system, such as SCADA etc.,:
• Control systems, vehicles, and even the human body
(WBAN) can be accessed and manipulated causing injury or
worse.
• Healthcare providers can improperly diagnose and treat
patients based on modified health information or
manipulated sensor data.
• Intruders can gain physical access to homes or commercial
businesses through attacks against electronic, remote
controlled door lock mechanisms.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 46
Individual
• Unauthorized tracking of people’s locations can occur
through usage pattern tracking based on asset usage time
and duration.
• Unlawful surveillance through persistent remote monitoring
capabilities offered by small-scale IoT devices.
• Inappropriate profiles and categorizations of individuals
can be created through examination of network and
geographic tracking and IoT metadata.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 47
Business Area
• Inappropriate profiles and categorizations of individuals
can be created through examination of network and
geographic tracking and IoT metadata.
• Manipulation of financial transactions through
unauthorized POS and POS access.
• Monetary loss arising from the inability to provide service.
• Vandalism, theft, or destruction of IoT assets that are
deployed in remote locations and lack physical security
controls.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 48
Ability to Access the IoT
• Ability to gain unauthorized access to IoT edge devices to
manipulate data by taking advantage of the challenges related
to updating software and firmware of embedded devices.
• Ability to gain unauthorized access to the Enterprise network
by compromising IoT edge devices and taking advantage of
trust relationships.
• Ability to create botnets by compromising large quantities of
IoT edge devices.
• Ability to impersonate IoT devices by gaining access to
keying material held in devices that rely up on software-based
trust stores.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 49
INSECURE ACCESS CONTROL
• Authorization frameworks for computer networks and
online services are role based. First, the identity of the user
is established and then his or her access privileges are
determined from the user’s role within an organization.
• E.g., RADIUS-Remote-Authentication Dial-In User Service.
• LDAP (Lightweight Directory Access Protocol)
• Role-Based Access Control Systems
• Access Control List-Based Systems
• Capability-Based Access
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 50
THREATS TO ACCESS CONTROL, PRIVACY,
AND AVAILABILITY
To secure devices access layer before users are at risk, following
actions should be taken:
(1)Implement security standards for IoT and ensure all devices
are produced by meeting specific security standards;
(2)Build trustworthy data sensing system and review the security
of all devices/components;
(3) Forensically identify and trace the source of users;
(4) Software or firmware at IoT end-node should be securely
designed.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 51
Security Threats and Vulnerabilities at IoT End-Node
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 52
ATTACKS SPECIFIC TO IoT
IoT applications might be subjected to most types of network
attacks, including :
Actually, more specific attacks to IoT have been emerged in
recently. Attackers can intercept or change the behavior of
smart home devices in many ways.
• Either by physical access
• Remote location
• Eavesdropping,
• Data modification
• Identity spoofing,
• Password-based attacks,
• DOS attack,
• Man-in-the-middle,
• Compromised-key attack,
• Sniffer attack
• Application layer attack
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 53
SECRECY AND SECRET-KEY CAPACITY
• The standardization of IoT is still an open issue.
• Available cryptography is designed at the application layer
without regard to the imperfections of the lower layer.
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 54
IoT in Health care
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 55
One way Authentication
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 56
Mutual Authentication
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 57
4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 58

More Related Content

What's hot

Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
Piyush Mittal
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
EUBrasilCloudFORUM .
 

What's hot (20)

Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Iot Security
Iot SecurityIot Security
Iot Security
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
Understanding IoT
Understanding IoTUnderstanding IoT
Understanding IoT
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
 

Similar to Security Requirements in IoT Architecture

Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
pdevang
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docx
alanfhall8953
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
 

Similar to Security Requirements in IoT Architecture (20)

assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
sample assignment
sample assignmentsample assignment
sample assignment
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Assign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptxAssign 1_8812814ctm.pptx
Assign 1_8812814ctm.pptx
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docx
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
A survey in privacy security in IOT
A survey in privacy security in IOT A survey in privacy security in IOT
A survey in privacy security in IOT
 

More from Vrince Vimal

GPS processing techniques & some applications
GPS processing techniques & some applicationsGPS processing techniques & some applications
GPS processing techniques & some applications
Vrince Vimal
 

More from Vrince Vimal (11)

Mac
MacMac
Mac
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor network
 
GPS Orbits
GPS OrbitsGPS Orbits
GPS Orbits
 
GPS processing techniques & some applications
GPS processing techniques & some applicationsGPS processing techniques & some applications
GPS processing techniques & some applications
 
Gps measurements
Gps measurementsGps measurements
Gps measurements
 
Equalisation, diversity, coding.
Equalisation, diversity, coding.Equalisation, diversity, coding.
Equalisation, diversity, coding.
 
Cellular concepts
Cellular conceptsCellular concepts
Cellular concepts
 
Basics of gps ii
Basics of gps  iiBasics of gps  ii
Basics of gps ii
 
Basics of gps 1
Basics of gps 1Basics of gps 1
Basics of gps 1
 
Small scale fading and multipath measurements
Small scale fading and multipath measurementsSmall scale fading and multipath measurements
Small scale fading and multipath measurements
 
Large scale path loss 1
Large scale path loss 1Large scale path loss 1
Large scale path loss 1
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 

Security Requirements in IoT Architecture

  • 1. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 1 Security Requirements in IoT Dr. Vrince Vimal Computer Science and Engineering
  • 2. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 2 Unit I 9 Hours SecurityRequirements in IoT Architecture - Security in Enabling Technologies - Security Concerns in IoT Applications. Security Architecture in the Internet of Things - Security Requirements in IoT - Insufficient Authentication/Authorization - Insecure Access Control - Threats to Access Control, Privacy, and Availability - Attacks Specific to IoT. Vulnerabilities – Secrecy and Secret-Key Capacity - Authentication/Authorization for Smart Devices - Transport Encryption – Attack & Fault trees. Unit II 9 Hours Cryptographic primitives and its role in IoT – Encryption and Decryption – Hashes – Digital Signatures – Random number generation – Cipher suites– key management fundamentals – cryptographic controls built into IoT messaging and communication protocols – IoT Node Authentication Unit III 8 Hours Identity lifecycle – authentication credentials – IoT IAM infrastructure – Authorization with Publish / Subscribe schemes – access control Unit IV 6 Hours Concerns in data dissemination – Lightweight and robust schemes for Privacy protection – Trust and Trust models for IoT – self-organizing Things - Preventing unauthorized access Unit V 8 Hours Cloud services and IoT – offerings related to IoT from cloud service providers – Cloud IoT security controls – enterprise IoT cloud security architecture – New directions in cloud enabled IoT computing.
  • 3. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 3 • The emerging Internet of Things (IoT) is believed to be the next generation of the Internet. • Easy target for Hackers as billion of devices Communicating without human intervention. • Intelligent sensors, wireless communication, networks, data analysis technologies, cloud computing have been developed • The development is in initial stages. Introduction
  • 4. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 4 • Security is significant obstacles in IoT • It which involves the sensing of :  Infrastructure security,  Communication network security  Application security  General system security.
  • 5. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 5 • Security means cryptography, secure communication, and privacy assurances. • But for IoT Security has diverse meaning i.e. • Data confidentiality, • Services availability, • Integrity, • Antimalware, • Information integrity, • Privacy protection, • Access control,
  • 6. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 6 • At the lower layer of IoT (sensing layer)  Limited computation capacity  Limited energy supply • At the Middle layer of IoT (network layer)  Eavesdropping or Interception,  Denial of service (DoS) attack. • At the upper layer of IoT (application layer)  Data aggregation and encryption compensates for issues of all layers.
  • 7. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 7 Security Requirements • In IoT, each connected device could be a potential doorway into the IoT infrastructure or personal data. • Security Concern would elevate once IoT reaches next level of interoperability and autonomous decision making and higher order security loopholes.
  • 8. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 8 Security Concerns in IoT
  • 9. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 9 SECURITY REQUIREMENTS IN IoT ARCHITECTURE • A critical requirement of IoT is that the devices must be interconnected. • N/W has to acquire, process and communicate data from real to virtual world. • provide applications with strong security protection
  • 10. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 10 • N/W must provide operational guarantees for the IoT, which bridges the gap between the physical devices and the virtual worlds. • Framework should consider:  Technical factors,  Sensing techniques,  Communication methods  Network technologies  Security protection,  Information confidentiality,  Transmission security,  Privacy protection,
  • 11. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 11  Business issues,  Business models,  Business processes • SoA has been successfully applied to IoT design • The services-based application will heavily depend on the architecture of IoT.
  • 12. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 12 SoA for IoT
  • 13. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 13 Sensing Layer and IoT End-Nodes For designing sensing layer of an IoT, the main concerns are: • Cost, size, resource, and energy consumption • Deployment. • Heterogeneity. • Communication. • Networks.
  • 14. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 14 The endless variety of IoT applications poses an equally wide variety of security challenges. Devices authentication Trusted devices Leveraging the security controls and availability of infrastructures in sensing layer. In terms of software update
  • 15. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 15 In this layer, the security concerns can be classified into two main categories: • The security requirements at IoT end-node: physically ;access control; authentication; nonrepudiation; confidentiality; integrity; availability; and privacy. • The security requirements in sensing layer: confidentiality; data source authentication; device authentication; integrity; availability, and timeless.
  • 16. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 16 Security Threats Description Unauthorized access Due to physically capture or logic attacked, the sensitive information at the end-nodes is captured by the attacker. Availability The end-node stops to work since physically captured or attacked logically Spoofing attack With malware node, the attacker successfully masquerades as IoT end-device, end-node, or end-gateway by falsifying data Selfish threat Some IoT end-nodes stop working to save resources or andwidth to cause the failure of network Malicious code Virus, Trojan, and junk message that can cause software failure DoS An attempt to make a IoT end-node resource unavailable to its users Transmission threats Threats in transmission, such as interrupting, blocking, data manipulation, forgery, etc.
  • 17. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 17 following actions should be taken: (1) Implement security standards for IoT and ensure all devices are produced by meeting specific security standards. (2) Build trustworthy data sensing system and review the security of all devices/ components. (3) Forensically identify and trace the source of users. (4) Software or firmware at IoT end-node should be securely designed.
  • 18. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 18 In the networking layer, the following issues should be addressed: • Network management technologies including the management for fixed, wireless, mobile networks, • Network energy efficiency, • Requirements of QoS, • Technologies for mining and searching, • Information confidentiality, • Security and privacy. Network Layer
  • 19. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 19 The security requirements in network layer involve: • Overall security requirements, • Privacy leakage: • Communication security: • Overconnected: • MITM attack: • Fake network message:
  • 20. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 20 The activities in service layer, conducted by following components: • Service discovery. • Service composition. • Trustworthiness management. • Service APIs. Service Layer
  • 21. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 21 The security requirements in the service layer include: Authorization, service authentication, group authentication, privacy protection, integrity, security of keys, nonrepudiation, antireplay, availability, etc. • Privacy leakage. The main concern in this layer involves privacy leakage and malicious location tracking. • Service abuses. In IoT the service abuse attack involves: i) illegal abuse of services; ii) abuse of unsubscribed services. • Node identify masquerade.
  • 22. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 22 • DoS attack. • Replay attack, the attacker resends the data. • Service information sniffer and manipulation. • Repudiation in service layer, it includes the communication repudiation and services repudiation.
  • 23. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 23 For the application maintenance, following security requirements will be involved: • Remote safe configuration. • Software downloading and updating. • Security patches. • Administrator authentication. • Unified security platform, etc. Application Layer
  • 24. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 24 In IoT in designing the security solutions, following rules should be helpful: a. Since most constrained IoT end-nodes work in an unattended manner, the designer should pay more attention to the safety of these nodes; b. As IoT involves billions of clustering nodes, the security solutions should be designed based on energy efficiency schemes; c. The light security scheme at IoT end-nodes might be different with existing network security solutions; however, we should design security solutions in a big enough range for all parts in IoT.
  • 25. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 25  Security in Identification and Tracking Technologies • Due to its capability for identifying, tracing, and tracking, the RFID system has been wide applications SECURITY IN ENABLING TECHNOLOGIES
  • 26. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 26 In general the security features of RFID include: • Tags/Readers collision problem Data confidentiality • Tag-to-reader authentication • High-assurance readers
  • 27. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 27 Security in Integration of WSN and RFID • IoT with the integration of RIFD and WSNs makes it possible to develop IoT applications for healthcare, decision-making of complex systems. • The security issue in integration of RFID and WSNs involves following challenges: • Privacy, • Identification and authentication, • Communication security,
  • 28. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 28 • Trust and ownership, • • Integration; • User authentication.
  • 29. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 29 SECURITY CONCERNS IN IoT APPLICATIONS• The IoT enables information gathering, transmitting, and storing to be available for devices in many scenarios, which creates or accelerates many applications such as : • Industrial control systems, • Retailing industry, • Smart shelf operations, • Healthcare, • Food and restaurant industry, • Logistic industry, travel • Tourism industry, etc.
  • 30. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 30 To integrate the devices of sensing layer as intrinsic parts of the IoT, effective security technology is essential to ensure security and privacy protection in various activities such as : • Personal activities, • Business processes, • Transportations, • Information protection.
  • 31. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 31 Security Concerns in SCADA Systems • SCADA systems are generally designed as more technical- oriented solutions often in the industrial environment. • Following security concerns are to be concerned while integrating SCADA with IoT:  Authentication and access control  Identification of SCADA vulnerabilities  Physical security  System recovery and backups
  • 32. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 32 Security Concerns in EIS • Enterprise information systems have played the pivotal role in modern organizations existing as Enterprise Resource Planning (ERP) systems which integrated • Intraorganizational business processes and Supply chain management systems to link Interorganizational business processes, and Customer Relationship Management (CRM) systems that maintain relationships with customers
  • 33. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 33 Security Architecture in the Internet of Things
  • 34. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 34 • The Internet of Things (IoT) is an extension of the Internet • The IoT is able to connect the digital cyberspace and real physical space. • IoT is able to introduce all the vulnerabilities of the digital world into our real world. • The success of IoT applications and IoT infrastructure significantly depends on the guarantee of the security and vulnerability in the IoT. • It is important to set up and take cyber defense seriously.
  • 35. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 35 SECURITY REQUIREMENTS IN IoT • The IoT introduces large quantities of new devices that will be deployed or embedded throughout an organization or even within a system. • Each connected device could be a potential doorway into the IoT infrastructure or personal data. • Data captured from these devices can be analyzed and acted upon.
  • 36. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 36 • Security Threats in IoT will reach new levels as interoperability, mashups, and autonomous decision- making begin to embed complexity, security loopholes. • The sanctity of security and privacy concerns of the IoT are not clearly defined yet. • loopholes might cause potential “black swan” events.
  • 37. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 37 • In a general framework main security requirements are addressed from six aspects:. IoT Data Security Challenges
  • 38. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 38 • Privacy risks will arise as objects within the IoT collect and aggregate fragments of data that relate to their service Data Confidentiality • Insufficient authentication/authentication • Insecure interfaces (web, mobile, cloud, etc.) • Lack of transport encryption • Confidentiality preserving & Access control Privacy • Privacy, data protection, & information security risk management • Privacy by design and default • Data protection legislation • Traceability/profiling/unlawful processing
  • 39. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 39 Trust • Identity management system • Insecure software/firmware • Ensuring continuity and availability of services • Realization of malicious attacks against IoT devices and system • Loss of user control/difficult in making decision • If we model IoT as 4 Layer architecture each layer should be able to provide access control, device authentication, data integrity, and confidentiality in transmission, availability, and the ability to defend IoT devices against virus and attacks.
  • 40. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 40
  • 41. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 41 Authentication in IoT • The soul of IoT framework is the authentication layer. (verify identity) • When M2M devices need access to the IoT infrastructure, the trust relationship is initiated based on the identity of the device. • In human and machine interactions names, patterns fingerprints, retina scan passwords can authenticate. • In M2M endpoints must be fingerprinted by means that do not require human interaction.
  • 42. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 42 • SSL/TLS X.509 certificate is a digital file that's usable for Secure Sockets Layer (SSL) or Transport Layer Security (TLS). The certificate fulfills two functions. First, the certificate can assist with authenticating and verifying the identity of a host or site. Second, it enables the encryption of information exchanged via a website. • However, in the IoT domain, many devices may not have enough memory to store a certificate. • IEEE - 802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. • TLS/DTLS , SSH, IPSec/IKE
  • 43. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 43 Authorization • The second layer of this framework is authorization that controls a device’s access throughout the network fabric. This layer builds upon the core authentication layer by leveraging the identity information of an entity.
  • 44. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 44 Insufficient Authentication/Authorization • On the Internet, the users are always authenticated by requiring a password and browsers authenticate web sites through the SSL (secure sockets layer protocol). • In the IoT, new devices that connected into an IoT system should be able to authenticate itself prior to receiving or transmitting data. • Deeply embedded devices often do not have users sitting behind keyboards. • Secure storage area plays important role.
  • 45. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 45 • Some new threats and attack vectors that malicious actors could take advantage of are as follows: In IoT-based industrial control system, such as SCADA etc.,: • Control systems, vehicles, and even the human body (WBAN) can be accessed and manipulated causing injury or worse. • Healthcare providers can improperly diagnose and treat patients based on modified health information or manipulated sensor data. • Intruders can gain physical access to homes or commercial businesses through attacks against electronic, remote controlled door lock mechanisms.
  • 46. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 46 Individual • Unauthorized tracking of people’s locations can occur through usage pattern tracking based on asset usage time and duration. • Unlawful surveillance through persistent remote monitoring capabilities offered by small-scale IoT devices. • Inappropriate profiles and categorizations of individuals can be created through examination of network and geographic tracking and IoT metadata.
  • 47. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 47 Business Area • Inappropriate profiles and categorizations of individuals can be created through examination of network and geographic tracking and IoT metadata. • Manipulation of financial transactions through unauthorized POS and POS access. • Monetary loss arising from the inability to provide service. • Vandalism, theft, or destruction of IoT assets that are deployed in remote locations and lack physical security controls.
  • 48. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 48 Ability to Access the IoT • Ability to gain unauthorized access to IoT edge devices to manipulate data by taking advantage of the challenges related to updating software and firmware of embedded devices. • Ability to gain unauthorized access to the Enterprise network by compromising IoT edge devices and taking advantage of trust relationships. • Ability to create botnets by compromising large quantities of IoT edge devices. • Ability to impersonate IoT devices by gaining access to keying material held in devices that rely up on software-based trust stores.
  • 49. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 49 INSECURE ACCESS CONTROL • Authorization frameworks for computer networks and online services are role based. First, the identity of the user is established and then his or her access privileges are determined from the user’s role within an organization. • E.g., RADIUS-Remote-Authentication Dial-In User Service. • LDAP (Lightweight Directory Access Protocol) • Role-Based Access Control Systems • Access Control List-Based Systems • Capability-Based Access
  • 50. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 50 THREATS TO ACCESS CONTROL, PRIVACY, AND AVAILABILITY To secure devices access layer before users are at risk, following actions should be taken: (1)Implement security standards for IoT and ensure all devices are produced by meeting specific security standards; (2)Build trustworthy data sensing system and review the security of all devices/components; (3) Forensically identify and trace the source of users; (4) Software or firmware at IoT end-node should be securely designed.
  • 51. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 51 Security Threats and Vulnerabilities at IoT End-Node
  • 52. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 52 ATTACKS SPECIFIC TO IoT IoT applications might be subjected to most types of network attacks, including : Actually, more specific attacks to IoT have been emerged in recently. Attackers can intercept or change the behavior of smart home devices in many ways. • Either by physical access • Remote location • Eavesdropping, • Data modification • Identity spoofing, • Password-based attacks, • DOS attack, • Man-in-the-middle, • Compromised-key attack, • Sniffer attack • Application layer attack
  • 53. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 53 SECRECY AND SECRET-KEY CAPACITY • The standardization of IoT is still an open issue. • Available cryptography is designed at the application layer without regard to the imperfections of the lower layer.
  • 54. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 54 IoT in Health care
  • 55. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 55 One way Authentication
  • 56. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 56 Mutual Authentication
  • 57. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 57
  • 58. 4/3/2020Privacy and Security in IoT; VI Sem; CSE; Dr. Vrince Vimal 58