Chapter 2

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 32

INTERNET OF THINGS

CHAPTER 2
2

What is IoT
Network of Physical Objects

Internet of Things (IoT) comprises things that have unique identities and
are connected to the Internet

The focus on IoT is in the configuration, control and networking via the
Internet of devices or “Things” that are traditionally not associated with the
internet
Eg: pump, utility meter, car engine

IoT is a new revolution in the capabilities of the endpoints that are


connected to the internet
3

What is IoT
Network of Physical Objects

The Scope of IoT is not limited to just connecting things (device,


appliances, machines) to the Internet

IoT allows these things to communicate and exchange data (control&


information)

Processing on these data will provide us various applications towards a


common user or machine goal
Idea: Move from Internet of People  Internet of Things 4

Internet appears everywhere in the world  Internet of Things is a plan to connect things
 It is primarily connection between people also using the same medium
Internet of Things - Evolution 5
IOT: People connecting with Things 6

ECG sensor

Internet

Motion sensor

Motion sensor
Motion sensor
IoT: Things connecting with Things 7

- Complex and heterogeneous


resources and networks
Looming Opportunity 8
IoT Applications : Intelligent Home 9
10
11
12
13
14
15
16
17

IOT TECHNOLOGIES

Kupat Tahu Presentation


IoT Technologies 18

Hardware (Device)

Communication Technology

Protocols for IoT

Software (IDE)

Cloud Platforms
Implementing Smart Objects 19

Beaglebone black

Intel Galileo

Raspberry Pi

Arduino Uno
Board Connection 20
21

Challenges of IoT
Connectivity

Power Management

Security

Rapid Evolution
IoT Security
IoT security is the technology area concerned
with safeguarding connected devices and
networks in the internet of things. IoT involves
adding internet connectivity to a system of
interrelated computing devices, mechanical and
digital machines, objects, animals and/or
people. Each thing" is "provided a 
unique identifier and the ability to automatically
transfer data over a network. Allowing devices to
connect to the internet opens them up to a
number of serious vulnerabilities if they are not
properly protected.
IoT security: trends, problems and challenges
 Problems and security challenges
 Many small devices have limited CPU power
 Not much processing power for security
 Need to look for new encryption scheme with less
CPU power.
 Can not install AV s o f t w a r e 
 Example: IP-addressable light bulbs.

 IoT also needs both encryption key management and


identity management
 It may scale into billions!
23
IoT security: trends, problems and challenges
 Problems and security challenges
 New devices for endpoint security
 New firmware, embedded OS, new
software & etc.
 It is not possible to support AV on every
device.
 New transport protocols for
making network security
difficult!

 Much more network traffic for


security analysis
 Bad news for large enterprises as network security is
already complex and cumbersome 24
Major Issues in IoT Security

• Lack of industry-accepted standards.


• The use of hardcoded or default passwords, which can lead to security
breaches. Even if passwords are changed, they are often not strong enough
to prevent infiltration.
• IoT devices is that they are often resource-constrained and do not contain
the compute resources necessary to implement strong security.
• Connecting legacy assets not inherently designed for IoT connectivity.
Replacing legacy infrastructure with connected technology is cost-
prohibitive.
IoT security breaches and IoT hacks

• Security experts have long warned of the potential risk of large numbers of unsecured
devices connected to the internet since the IoT concept first originated in the late 1990s. 
• A number of attacks subsequently have made headlines, from refrigerators and TVs
being used to send spam to hackers infiltrating baby monitors and talking to children.
• In 2010, for example, researchers revealed that the Stuxnet virus was used to physically damage
the centrifuges, with attacks starting in 2006 but the primary attack occurring in 2009.
• Often considered one of the earliest examples of an IoT attack, Stuxnet targets supervisory
control and data acquisition (SCADA) systems in industrial control systems (ICS), using malware
to infect instructions sent by programmable logic controllers
What industries are most vulnerable to IoT
security threats?
• IoT security hacks can happen in any industry, from smart home to a manufacturing
plant to a connected car. The severity of impact depends greatly on the individual
system, the data collected and/or the information it contains.
• An attack could disable the brakes of a connected car, for example, or on a
connected health device, such as an insulin pump hacked to administer too much
medication to a patient, can be life-threatening.
• Other attacks, however, cannot be underestimated. For example, an attack against
smart door locks could potentially allow a burglar to enter a smart home.
How to protect IoT systems and devices
• IoT security methods vary depending on your specific IoT application and your
place in the IoT ecosystem.
• IoT manufacturers should concentrate on building security in from the start, making
hardware tamper-proof, building secure hardware, ensuring secure upgrades, providing
firmware updates/patches and performing dynamic testing.
• A solution developer's focus should be on secure software development and secure
integration.
IoT security measures
• Incorporating Security at the Design Phase. IoT developers should include security at the
start of any consumer-, enterprise- or industrial-based device development. Enabling security
by default is critical, as well as providing the most recent operating systems and using secure
hardware.
• Hardcoded Credentials should never be part of the design process. An additional measure
developers can take is to require credentials be updated by a user before the device functions.
If a device comes with default credentials, users should update them using a strong password
or multifactor authentication or biometrics where possible.
IoT security measures
Contd…..

• API Security. Application performance indicator (API) security is essential to


protect the integrity of data being sent from IoT devices to back-end systems
and ensure only authorized devices, developers and apps communicate with
APIs.
• Identity Management. Providing each device with a unique identifier is critical
to understanding what the device is, how it behaves, the other devices it
interacts with and the proper security measures that should be taken for that
device.
• Hardware Security. Endpoint hardening includes making devices tamper-proof
or tamper-evident. This is especially important when devices will be used in
harsh environments or where they will not be monitored physically.
IoT security measures
Contd…..
• Strong Encryption is critical to securing communication between devices. Data at rest
and in transit should be secured using cryptographic algorithms. This includes the use of
key lifecycle management.
• Network Security. Protecting an IoT network includes ensuring port security, disabling
port forwarding and never opening ports when not needed; using antimalware, firewalls
and intrusion detection system/intrusion prevention system; blocking unauthorized IP
addresses; and ensuring systems are patched and up to date.
• IoT Devices that need to connect directly to the internet should be segmented into their
own networks and have access to enterprise network restricted. Network segments
should be monitoring for anomalous activity, where action can be taken, should an issue
be detected.
• Security Gateways. Acting as an intermediary between IoT devices and the network,
security gateways have more processing power, memory and capabilities than the IoT
devices themselves, which provides them the ability to implement features such as
firewalls to ensure hackers cannot access the IoT devices they connect.
IoT security measures
Contd…..
• Patch management/continuous software updates. Providing means of
updating devices and software either over network connections or
through automation is critical.
• keeping security staff up to date with new or unknown systems, learn new
architectures and be ready for new security challenges.
• Consumer education: they must be made aware of the dangers of IoT
systems and provided steps they can take to stay secure, such as updating
default credentials and applying software updates.

You might also like