Module 4 Iot
Module 4 Iot
Module – 4
IoT Physical Devices and Endpoints - RaspberryPi: Introduction to RaspberryPi, About the
RaspberryPi Board: Hardware Layout, Operating Systems on RaspberryPi, Configuring
RaspberryPi, Programming RaspberryPi with Python, Wireless Temperature Monitoring
System Using Pi, DS18B20 Temperature Sensor,
Module- 4
Introduction to RaspberryPi
• The RaspberryPi is a series of credit card sized single-board computers developed in the
United Kingdom by the Raspberrypi Foundation to promote the teaching of basic
computer science in schools and developing countries.
• Several generations of RaspberryPi have been released.
• The first generation (RaspberryPi 1 model B) was released in February 2012, followed by
a simple and inexpensive model A.
• In 2014 , the foundation released a board with an improved design in Raspberry 1 model
B+.
• Improved A+ and B+ model were released a year later.
• RaspberryPi Zero with smaller size and limited input/output (I/O)and general purpose
input/ output (GPIO) abilities was released in November 2015 for US $5.
• RaspberryPi 2 which added more RAM was released in February 2015.
• RaspberryPi 3 model B released in February 2016 in bundled with on-board Wi-Fi and
Bluetooth.
• As of 2016 , Raspberrypi 3 model b is the newest mainline RaspberryPi. These boards are
priced between US $ 5-35.
Accessories
Camera: On 14 May 2013 , the establishment and the merchants RS Components and
Premier Farnell/ Element 14 propelled the Raspberry pi camera board with a firmware
redesign to bolster it.
Gertboard- A Raspberry Pi Foundation authorized gadget intended for instructive
purpose, and grows the Raspberry Pi’s GPIO pins to permit interface with of LEDs ,
switches, sensors and different gadgets.
Serial :- The serial interface on Raspberry Pi has receive(rx) and transmit(Tx) pins for
communication with serial peripherals.
SPI:- Serial Peripheral interfaces( SPI) is a synchronous serial data protocol used for
communication with one or more peripheral devices.
• MISO (Master In Slave Out): Master line for sending data to the peripherals.
• MOSI(Master out Slave In): Slave line for sending data to the master.
• SCK( Serial Clock): Clock generated by Master to synchronize data
transmission.
INTERNET OF THINGS TECHNOLOGY Page 5
• CEO( Chip Enable 0): To enable or disable device
• CEO( Chip Enable 1): To enable or disable device
I2C:- The I2C interface pins on Raspberry Pi allow you to connect hardware
modules.
5.8.5) Recalbox
5.9.2) OS installation
11) Explain Smart City IoT Architecture with a neat diagram. (CO5)
12) Explain Smart City Security Architecture with a neat diagram. (CO5)
Securing IoT
Historical perspective of OT security, how it has evolved, and some of the common challenges it faces.
It also details some of the key differences between securing IT and OT environments. Finally, it
explores a number of practical steps for creating a more secure industrial environment, including
best practices in introducing modern IT network security into legacy industrial environments.
The security challenges faced in IoT are by no means new and are not limited to specific industrial
environments. The following sections discuss some of the common challenges faced in IoT.
Device Insecurity
Beyond the communications protocols that are used and the installation base of legacy
systems, control and communication elements themselves have a history of vulnerabilities.
To understand the nature of the device insecurity, it is important to review the history of
what vulnerabilities were discovered and what types of devices were affected. A review of the
time period 2000 to 2010 reveals that the bulk of discoveries were at the higher levels of the
operational network, including control systems trusted to operate plants, transmission systems, oil
pipelines, or whatever critical function is in use.
OCTAVE
OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation) has undergone
multiple iterations. The version this section focuses on is OCTAVE Allegro, which is intended to
be a lightweight and less burdensome process to implement. Allegro assumes that a robust security
team is not on standby or immediately at the ready to initiate a comprehensive security review.
This approach and the assumptions it makes are quite appropriate, given that many operational
technology areas are similarly lacking in security-focused human assets. Figure 8-5 illustrates the
OCTAVE Allegro steps and phases.
FAIR
FAIR (Factor Analysis of Information Risk) is a technical standard for risk definition from The
Open Group. While information security is the focus, much as it is for OCTAVE, FAIR has clear
applications within operational technology. Like OCTAVE, it also allows for non-malicious actors
as a potential cause for harm, but it goes to greater lengths to emphasize the point. For many
operational groups, it is a welcome acknowledgement of existing contingency planning. Unlike
with OCTAVE, there is a significant emphasis on naming, with risk taxonomy definition as a very
specific target.
FAIR places emphasis on both unambiguous definitions and the idea that risk and
associated attributes are measurable. Measurable, quantifiable metrics are a key area of emphasis,
which should lend itself well to an operational world with a richness of operational data. At its
base, FAIR has a definition of risk as the probable frequency and probable magnitude of loss. With
this definition, a clear hierarchy of sub-elements emerges, with one side of the taxonomy focused
on frequency and the other on magnitude.
Loss even frequency is the result of a threat agent acting on an asset with a resulting loss to
the organization. This happens with a given frequency called the threat event frequency (TEF), in
which a specified time window becomes a probability. There are multiple sub-attributes that
define frequency of events, all of which can be understood with some form of measurable metric.
Threat event frequencies are applied to a vulnerability. Vulnerability here is not necessarily some
compute asset weakness, but is more broadly defined as the probability that the targeted asset will
fail as a result of the actions applied. There are further sub-attributes here as well.
Another security practice that adds value to a networked industrial space is convergence, which
is the adoption and integration of security across operational boundaries. This means coordinating
security on both the IT and OT sides of the organization. Convergence of the IT and OT spaces is
merging, or at least there is active coordination across formerly distinct IT and OT boundaries.
From a security perspective, the value follows the argument that most new networking and
compute technologies coming to the operations space were previously found and established in the
IT space. It is expected to also be true that the practices and tools associated with those new
INTERNET OF THINGS TECHNOLOGY Page 30
technologies are likely to be more mature in the IT space.
There are advanced enterprise-wide practices related to access control, threat detection,
and many other security mechanisms that could benefit OT security.
As stated earlier, the key is to adjust the approach to fit the target environment. Several areas
are more likely to require some kind of coordination across IT and OT environments. Two such
areas are remote access and threat detection. For remote access, most large industrial organizations
backhaul communication through the IT network. Some communications, such as email and web
browsing, are obvious communication types that are likely to touch shared IT infrastructure. Often
vendors or consultants who require some kind of remote access to OT assets also traverse the IT
side of the network. Given this, it would be of significant value for an OT security practitioner to
coordinate access control policies from the remote initiator across the Internet-facing security
layers, through the core network, and to a handoff point at the industrial demarcation and deeper,
toward the IoT assets.
The use of common access controls and operational conditions eases and protects network
assets to a greater degree than having divergent groups creating ad hoc methods. Using location
information, participant device security stance, user identity, and access target attributes are all
standard functions that modern access policy tools can make use of. Such sophistication is a
relatively new practice in industrial environments, and so, if these functions are available, an OT
security practitioner would benefit from coordination with his or her IT equivalents.