Chapter 2
Chapter 2
Chapter 2
CHAPTER 2
2
What is IoT
Network of Physical Objects
Internet of Things (IoT) comprises things that have unique identities and
are connected to the Internet
The focus on IoT is in the configuration, control and networking via the
Internet of devices or “Things” that are traditionally not associated with the
internet
Eg: pump, utility meter, car engine
What is IoT
Network of Physical Objects
Internet appears everywhere in the world Internet of Things is a plan to connect things
It is primarily connection between people also using the same medium
Internet of Things - Evolution 5
IOT: People connecting with Things 6
ECG sensor
Internet
Motion sensor
Motion sensor
Motion sensor
IoT: Things connecting with Things 7
IOT TECHNOLOGIES
Hardware (Device)
Communication Technology
Software (IDE)
Cloud Platforms
Implementing Smart Objects 19
Beaglebone black
Intel Galileo
Raspberry Pi
Arduino Uno
Board Connection 20
21
Challenges of IoT
Connectivity
Power Management
Security
Rapid Evolution
IoT Security
IoT security is the technology area concerned
with safeguarding connected devices and
networks in the internet of things. IoT involves
adding internet connectivity to a system of
interrelated computing devices, mechanical and
digital machines, objects, animals and/or
people. Each thing" is "provided a
unique identifier and the ability to automatically
transfer data over a network. Allowing devices to
connect to the internet opens them up to a
number of serious vulnerabilities if they are not
properly protected.
IoT security: trends, problems and challenges
Problems and security challenges
Many small devices have limited CPU power
Not much processing power for security
Need to look for new encryption scheme with less
CPU power.
Can not install AV s o f t w a r e
Example: IP-addressable light bulbs.
• Security experts have long warned of the potential risk of large numbers of unsecured
devices connected to the internet since the IoT concept first originated in the late 1990s.
• A number of attacks subsequently have made headlines, from refrigerators and TVs
being used to send spam to hackers infiltrating baby monitors and talking to children.
• In 2010, for example, researchers revealed that the Stuxnet virus was used to physically damage
the centrifuges, with attacks starting in 2006 but the primary attack occurring in 2009.
• Often considered one of the earliest examples of an IoT attack, Stuxnet targets supervisory
control and data acquisition (SCADA) systems in industrial control systems (ICS), using malware
to infect instructions sent by programmable logic controllers
What industries are most vulnerable to IoT
security threats?
• IoT security hacks can happen in any industry, from smart home to a manufacturing
plant to a connected car. The severity of impact depends greatly on the individual
system, the data collected and/or the information it contains.
• An attack could disable the brakes of a connected car, for example, or on a
connected health device, such as an insulin pump hacked to administer too much
medication to a patient, can be life-threatening.
• Other attacks, however, cannot be underestimated. For example, an attack against
smart door locks could potentially allow a burglar to enter a smart home.
How to protect IoT systems and devices
• IoT security methods vary depending on your specific IoT application and your
place in the IoT ecosystem.
• IoT manufacturers should concentrate on building security in from the start, making
hardware tamper-proof, building secure hardware, ensuring secure upgrades, providing
firmware updates/patches and performing dynamic testing.
• A solution developer's focus should be on secure software development and secure
integration.
IoT security measures
• Incorporating Security at the Design Phase. IoT developers should include security at the
start of any consumer-, enterprise- or industrial-based device development. Enabling security
by default is critical, as well as providing the most recent operating systems and using secure
hardware.
• Hardcoded Credentials should never be part of the design process. An additional measure
developers can take is to require credentials be updated by a user before the device functions.
If a device comes with default credentials, users should update them using a strong password
or multifactor authentication or biometrics where possible.
IoT security measures
Contd…..