0% found this document useful (0 votes)
14 views

Unit 3 Iot Protocols and Security

Uploaded by

leonlalichan2002
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Unit 3 Iot Protocols and Security

Uploaded by

leonlalichan2002
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 65

Unit – 3

IoT Protocols and Security


Protocol Standardization for IoT

• In IOT we have to follow some standards for developing a product.


• Standards consists of specifications and universally accepted protocols.
• If any product is developed according to the standards,the performance is guaranteed.
What are standards?
 Standards form the foundation building block of product development by establishing
consistent protocols that can be universally understood and adopted
 Standards ensures interoperability and interconnectivity
 Interoperability-The ability of one system to communicate with other system regardless of
manufacturer or any technical specification.
 Eg..elderly patient monitoring system, intrusion detection sys.. both has the same
infrastructures so need a camera as well as a ..so if both are developed using the stds, ,they
will be able to share the sensor data with each other.. sharing the same sensor data between
2 systems without any difficulty..so all the system have to follow the stds.

IOT a consortium

• This consortium consists of 17 European organizations from nine countries developed reference
architecture, models, procedure and different technologies which are used for developing an IOT
product

• They developed 2 deliverables-work package and study group. All these deliverables contain all
the standards and specifications for developing an IOT product.

Four pillars of iot


 M2M
 WSN
 SCADA
 RFID

20 March 2018 Unit 4 - IoT Protocols and Security 2


20 March 2018 Unit 4 - IoT Protocols and Security 3
These 3 are the major organizations which worked for developing the standards for M2M architecture.

20 March 2018 Unit 4 - IoT Protocols and Security 4


20 March 2018 Unit 4 - IoT Protocols and Security 5
A device that converts variations in a physical quantity, such as pressure or brightness, into an electrical signal, or vice
versa…transducer

20 March 2018 Unit 4 - IoT Protocols and Security 6


Why do we need a transducer?
To determine the exact magnitude of physical forces such as temperature and pressure is difficult. But, if
these physical forces are converted into an electrical signal, then their values can be easily determined
using a meter. The primary function of transducers is to convert a physical force into an electrical signal so
that it can be easily handled and transmitted for measurement. Transducers converts energy from one form

to another form-All sensors and actuators are transducers. Each sensor carries a memory chip. That chip
contains all the info about sensor. .It can communicates its info to all other devices.

20 March 2018 Unit 4 - IoT Protocols and Security 7


M2M and WSN Protocols

• Most M2M applications are developed today in a highly customized fashion


• High-level M2M architecture from M2M Standardization Task Force (MSTF) does include fixed
& other non cellular wireless networks

• Other M2M standards activities include:


• Data transport protocol standards - M2MXML, JavaScript Object Notation (JSON), BiTXML,
WMMP, MDMP

• Extend OMA DM to support M2M devices protocol management objects


• M2M device management, standardize M2M gateway
• M2M security and fraud detection
• Network API’s M2M service capabilities
20 March 2018 Unit 4 - IoT Protocols and Security 8
• Remote management of device behind gateway/firewall
• Open REST-based API for M2M applications

SCADA and RFID Protocols
• Supervisory Control And Data Acquisition
• Supervisory Control and Data Acquisition (SCADA) is a system that aims to monitor and control
field devices at your remote sites. SCADA systems are critical as it helps maintain efficiency by
collecting and processing real-time data.
• SCADA is a centralized system that monitors and controls the entire area. This supervisory
system gathers data on the process and sends the commands control to the process.
• The main goal of this supervisory system is to monitor and control equipment in the industrial
processes for companies in the public and private sectors. As a matter of fact, in today's world,
there are SCADA systems almost everywhere. This includes industrial plants, manufacturing,

transportation, oil and gas, power distribution, water control and etc.

20 March 2018 Unit 4 - IoT Protocols and Security 9



Four SCADA Functions
SCADA systems perform several functions that allow for proper management of remote facilities. The
following are the core functions of a SCADA system.

20 March 2018 Unit 4 - IoT Protocols and Security 10


Data Acquisition
The collection of SCADA data frequently involves some kind of analog to digital conversion.
Temperature is converted to degrees Celsius. Transmit signal strength is converted to dBm.
Channel quality is measured in errored seconds.
Networked Data Communication
The collected data is transmitted either spontaneously or in response to a request for data to some
kind of upstream consolidator or master. The communication channel can be analog or digital.
Data Presentation
The collected data is processed, organized and presented for system operators to make
appropriate response and control decisions. The presentation can vary from tabular presentation
of logged events to graphical presentation against mapping or image backgrounds.
Control
If control decisions are warranted and the system supports output, appropriate commands can be
dispatched to affect specific operational or configuration changes. Most control actions are
performed by RTUs and PLCs.
20 March 2018 Unit 4 - IoT Protocols and Security 11
The Four Main Components Of SCADA
If you plan to deploy a SCADA system, then you need to know and understand the four important system
components that present in every SCADA network.

Inputs
Inputs (either digital or analog) and output relays or electrical signals that directly interface with
managed elements in the remote sites. That's where the SCADA functions start.
These sensors and control relays perform the data acquisition but can't interpret communication
protocols on their own. But your SCADA system still needs a way to collect this data and report
it to you in a meaningful way. That's where RTUs come into play.
Remote Telemetry Units (RTUs)
Just like Programmable Logic Controllers (PLC), RTUs are small computerized units deployed
in the field at specific sites and locations. Remote telemetry unit, also known as a remote
terminal unit (RTU), serves as local collection points for gathering reports from sensors and
delivering commands to control relays.

20 March 2018 Unit 4 - IoT Protocols and Security 12


Human Machine Interface (HMI) SCADA
HMI software is a computer master station system that processes data and allows a human
operator to manage and control the system. HMIs provide the human operator with information
gathered from multiple RTUs. This information is displayed in the master unit's user interface
that should be understandable and actionable since quick response actions to alarms are usually
required.
Communications Network
The communications network is what connects telemetry and SCADA at your remote sites.
Today, one of the most common communications technology is Ethernet.

20 March 2018 Unit 4 - IoT Protocols and Security 13


 The User Interface(UI) of Mobile App or Web based dashboard represented above is the
HMI(human machine interface) of the SCADA system.
 This, along with the backend business logic, database (cloud server) and a Gateway
constitutes of a SCADA solution for control and monitoring of devices in an IoT network.
 The IoT gateway ensures compatibility between IoT sensor network and cloud server.
Through the gateway, the sensor data is stored in the cloud server.
 The cloud server is the hosting spot for the algorithms that implement the business logic.

20 March 2018 Unit 4 - IoT Protocols and Security 14


 The sensor unit detects the change in the environment like change in temperature, sound
and also acts as a data accumulating unit.
 There can be a number of devices or machines connected within a SCADA solution based
IoT project. For an instance, in case of home automation system, various home appliances
such as AC, lights, refrigerator can be a part of connected smart home.

RFID

Radio Frequency Identification – or RFID – is used to automatically identify an object and capturing data
about that object that has been stored in a small microchip tag and attached to the object. The RFID tag has
a built-in antenna that communicates to a scanning device that reads the data remotely. The data is then

20 March 2018 Unit 4 - IoT Protocols and Security 15


transferred from the scanning device to the enterprise application software that houses the data. Each RFID
tag has its own unique identifying number.

The components of RFID

Using radio waves and electromagnetic fields to send data, an RFID tag and the system that reads it
consists of three main components.

Component #1 – the RFID tag: there are two types of RFID tags, passive and active. A passive RFID tag

is the barcode you see in the supermarket. It is assigned to an item, it is easy to activate, and it does not
have a power supply. An active RFID tag, like the sensor tag in the back of a library book, has a microchip

that collects information about the asset and may also contain an antenna or on-board sensor.

Component #2 – the RFID reader: An RFID reader is a device that scans the RFID tag and collects
information about the asset the tag is attached to. These readers can be hand-held or wired, and work with

20 March 2018 Unit 4 - IoT Protocols and Security 16


USB and Bluetooth. Not all barcode scanners can read an RFID tag, but all RFID readers can read a
barcode.

Component #3 – the RFID applications or software: this software controls the


monitors with the RFID tags that have been attached to your assets. It can be a mobile appli
cation or a standard software package. Most of the time you can find RFID software that has a
mobile application that works in conjunction with it. This software can communicate with the reader
using Bluetooth technology.

RFID can be used to record and control the movement of assets and personnel. You’ve probably seen
RFID tags on the back of your library books, or even in the new biometric passports. It makes tracking
assets contained in boxes or pallets easier to manage.

When used in IoT, RFID tags are handy in cameras, GPS, and other smart sensors. Thy can help identify
and locate objects. It is an inexpensive way to turn objects in the home “smart,” like the popular line of
Google Nest products. Some healthcare systems are using RFID tags to track patients and their medical

20 March 2018 Unit 4 - IoT Protocols and Security 17


records. Transportation systems are using RFID to read passenger data, keep traffic in control, and update
transport systems.

Unified Data Standards


• HTML/HTTP combination of data format and exchange protocol is the foundation pillar of
WWW

• Many standardization efforts have been trying to define unified data representation, protocol for
IoT.
• Before IoT, Internet was actually an Internet of documents or of multimedia documents.
• Two pillars of Internet including HTML/HTTP turned the Internet into WWW.
• We need to turn the IoT into the WoT.
• What will it take to make this to happen?

20 March 2018 Unit 4 - IoT Protocols and Security 18


• Do we need a new HTML/HTTP-like standard for MTC(m/c type communications) and
WoT(web of things)? (To communicate with your ten IoT devices, you need ten mobile
applications. This won’t be convenient as you will have to switch between one app to another.
Unfortunately, that is happening with most IoT devices. Connecting devices to the internet and
giving them IP addresses is only the first step towards the internet of things as it facilitates data
exchange. However, it doesn’t guarantee that devices understand what it means.

• That’s why we need something like HTTP, a universal way to transfer data in text, images,
sound, and other media elements so that devices communicate with each other.
 The Web of Things – or WoT – is what fills this vacuum by using and adapting Web protocols to
connect anything in the physical world and give it a presence on the World Wide Web!
 Web of Things (WoT) refers to a set of standards formed by the world wide web consortium (W3C)
to facilitate the interoperability, fragmentation, and usability of the Internet of Things (IoT).
 In other words, it is a subset of the internet of things (IoT) and is built around software standards
such as REST, HTTP, and URIs to allow devices to interact with one another.

20 March 2018 Unit 4 - IoT Protocols and Security 19


 Browser is intended for humans, so do we need new browser for machines to make sense of ocean
of machine-generated data? If not, what extensions do we need to make to the existing browsers?

Protocols – IEEE 802.15.4


 IEEE 802.15.4 is the std which is the basis for
many low power wireless connectivity
solutions including Zigbee,6LoWPAN.
 Defines operation of low-rate wireless
personal area networks (LR-WPANs).
• Specifies physical layer and media access
control for LR-WPANs.
• Maintained by IEEE 802.15 working group,
which defined the standard in 2003.

20 March 2018 Unit 4 - IoT Protocols and Security 20


 Physical Layer (PHY) provides data transmission service & interface to physical layer
management entity

• MAC enables transmission of MAC frames through the use of the physical channel

BACNet Protocol

• BACnet is a network protocol used in building automation systems (BAS) to control the data
exchange between different devices and components.

• BACnet stands for Building Automation and Control Network.

20 March 2018 Unit 4 - IoT Protocols and Security 21


• It is a network standard developed by the American Heating Refrigerating and Air
Conditioning Engineers. The American National Standard Institute (ANSI) and International
Standard for Organization (ISO) have also adopted BACnet as a standard for networking building
automation systems.

• Utilizing a building automation system is a top choice for many industries, and the need to
implement it efficiently is essential.
• In every building automation system, communication plays a key factor in its success.
Communication should be timely and error-free. This is only possible if all manufacturers follow
the same set of rules, known as a network protocol. If network protocol isn’t followed, it can
waste essential information, resulting in wrong decisions.

• Designed to allow communication of building automation & control system for application like
Heating, Ventilating and Air-conditioning Control (HVAC)

• Lighting Control, Access Control


20 March 2018 Unit 4 - IoT Protocols and Security 22
• Fire Detection Systems and their Associated Equipment
• Defines a number of services that are used to communicate between building devices

Modbus
Modbus is a data communication protocol that allows devices to
exchange information over various types of media, including serial
lines, Ethernet, and wireless

Modbus uses a request-response model with a master-slave


relationship.
The master initiates a request and waits for a response from the slave.
The master is usually a human-machine interface (HMI) or
Supervisory Control and Data Acquisition (SCADA) system, while the
20 March 2018 Unit 4 - IoT Protocols and Security 23
slave is a sensor, programmable logic controller (PLC), or
programmable automation controller (PAC).
Protocol Versions

• Modbus RTU
• Modbus ASCII
• Modbus TCP/IP or Modbus TCP
• Modbus over TCP/IP or Modbus over TCP or Modbus RTU/IP
• Modbus over UDP
• Modbus Plus (Modbus+, MB+ or MBP)
• Pemex Modbus
20 March 2018 Unit 4 - IoT Protocols and Security 24
• Enron Modbus

KNX Protocol

The KNX protocol is an open-source standard for building automation and home control systems
that allows devices and systems to communicate with each other:

Purpose

KNX is used to manage and control building systems, such as lighting, heating, ventilation, security,
and audiovisual equipment.

20 March 2018 Unit 4 - IoT Protocols and Security 25


Features

KNX is a single language that allows all components of a building automation system to
communicate with each other, even if they use different coding languages. KNX can be installed in
new buildings or retrofitted into existing ones, and can use wired or wireless transmission media.

KNX System Components


• All the devices for a KNX installation are connected together by a two wire bus to exchange
data
• Sensors
• Actuators

• System devices and components

20 March 2018 Unit 4 - IoT Protocols and Security 26


ZIGBEE

• ZigBee is a Personal Area Network task group with low rate


task group 4. It is a technology of home networking.

• ZigBee is a technological standard created for controlling and


sensing the network.

• ZigBee is the Personal Area network of task group 4 so it is


based on IEEE 802.15.4 and is created by Zigbee Alliance.
20 March 2018 Unit 4 - IoT Protocols and Security 27
• ZigBee is a standard that addresses the need for very low-cost
implementation of Low power devices with Low data rates for
short-range wireless communications.

Types of ZigBee Devices:

 Zigbee Coordinator Device: It communicates with routers. This


device is used for connecting the devices.

 Zigbee Router: It is used for passing the data between devices.

 Zigbee End Device: It is the device that is going to be controlled.


20 March 2018 Unit 4 - IoT Protocols and Security 28
Zigbee Network Topologies:

20 March 2018 Unit 4 - IoT Protocols and Security 29


 Star Topology (ZigBee Smart Energy): Consists of a coordinator
and several end devices, end devices communicate only with the
coordinator.

 Mesh Topology (Self Healing Process): Mesh topology consists of


one coordinator, several routers, and end devices.

 Tree Topology: In this topology, the network consists of a central


node which is a coordinator, several routers, and end devices. the
function of the router is to extend the network coverage.

Zigbee Applications:

20 March 2018 Unit 4 - IoT Protocols and Security 30


1. Home Automation

2. Medical Data Collection

3. Industrial Control Systems

4. meter reading system

5. light control system

20 March 2018 Unit 4 - IoT Protocols and Security 31


ZigBee Architecture

20 March 2018 Unit 4 - IoT Protocols and Security 32


ZigBee Architecture
20 March 2018 Unit 4 - IoT Protocols and Security 33
• Divided into three sections
• IEEE 802.15.4 which consists of MAC and physical layers
• ZigBee layers, which consist of the network layer, the ZigBee
device object (ZDO), the application sublayer, and security
management
• Manufacturer application: Manufacturers of ZigBee devices can
use the ZigBee application profile or develop their own
application profile
Network Layer

• Located between the MAC layer and application support


sublayer
• Provides the following functions:
20 March 2018 Unit 4 - IoT Protocols and Security 34
• Starting a network
• Managing end devices joining or leaving a network
• Route discovery
• Neighbour discovery
APS Layer

• Application Support Sublayer (APS)


• Provides services necessary for application objects (endpoints)
and the ZigBee device object (ZDO)
• Some of services provided by the APS to the application objects
for data transfer are
• Request
20 March 2018 Unit 4 - IoT Protocols and Security 35
• Confirm
• Response
• Application Object
(endpoint)
• Defines input and output to the APS
• For example, a switch that controls a light is the input from the
application object, and the output is the light bulb condition
• Each node can have 240 separate application objects

ZigBee Device Object (ZDO)


• Control and management of application objects
• Performs overall device management tasks:
20 March 2018 Unit 4 - IoT Protocols and Security 36
• Determines the type of device in a network (for example, end
device, router, or coordinator)
• Initializes the APS, network layer, and security service provider
• Performs device and service discovery
• Initializes coordinator for establishing a network
• Security management
• Network management

• End Node
• Each end node or end device can have multiple EPs
• Each EP contains an application profile, such as home
automation
20 March 2018 Unit 4 - IoT Protocols and Security 37
• can be used to control multiple devices or single device
• ZigBee Addressing Mode
• ZigBee uses direct, group, and broadcast addressing for
transmission of information

20 March 2018 Unit 4 - IoT Protocols and Security 38


IOT Security

• Fundamental idea - IoT will connect all objects around us to


provide smooth communication
• Economic of scale in IoT presents new security challenges
for global devices in terms of
– Authentication
– Addressing
– Embedded Security
IOT Security

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 3
( Nashik )
• Devices like RFID and sensor nodes have no access control
functionality
• Can freely obtain or exchange information from each other
• So authentication & authorization scheme must be established
between these devices to achieve the security goals for IoT
• Privacy of things and security of data is one of the key
challenges in the IoT

Vulnerabilities of IoT

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 4
( Nashik )
Vulnerabilities of IoT
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 5
( Nashik )
• Unauthorized Access
– One of the main threats is the tampering of resources by
unauthorized access
– Identity-based verification should be done before granting the
access rights
• Information corruption
– Device credential must be protected from tampering
– Secure design of access rights, credential and exchange is
required to avoid corruption
Vulnerabilities of IoT

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 6
( Nashik )
• Theft of Resources
– Access of shared resources over insecure channel causes theft
of resources
– Results into man-in-the-middle attack
• Information Disclosure
– Data is stored at different places in different forms
– Distributed data must be protected from disclosure
– Context-aware access control must be enforced to regulate
access to system resources
Vulnerabilities of IoT

• DoS Attack
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 7
( Nashik )
– Denial of Service (DoS)
– Makes an attempt to prevent authentic user from accessing
services which they are eligible for
– For example, unauthorized user sends to many requests to
server
– That flood the network and deny other authentic users from
access to the network
Vulnerabilities of IoT

• DDoS Attack
– Distributed Denial of Service

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 8
( Nashik )
– Type of DoS attack where multiple compromised systems are
used to target single system causing DoS
– Compromised systems – usually infected with Trojan –
Victims of a DDoS attack consist of both

• End targeted systems


• All systems maliciously used and controlled by the hacker in the
distributed attack
Vulnerabilities of IoT

• CyberBunker Launches “World’s Largest” DDoS Attack

• Slows down the Entire Internet


Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 9
( Nashik )
• CyberBunker - Dutch web hosting company

• Caused global disruption of the web

• Slowing down internet speeds for millions of users across the


world, according to BBC report
Vulnerabilities of IoT

• Few real examples of attacks that hit the IoT:


– Carna Botnet – 4,20,000 ‘things,’ such as routers, modems,
printers were compromised
– TRENDnet’s connected cameras were hacked, with feeds
from those cameras published online
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 10
( Nashik )
– Linux.Darlloz - PoC IoT worm found in the wild by
Symantec, 1,00,000 compromised systems including
connected things such as TVs, routers and even a fridge

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 11
( Nashik )
Security
Requirements
Flexibili
t y&
Access
Contro
l Authenti
Adaptab catio
i lity n

Data
Scalabilit
Confiden
y
tiality
Security
Requirem
e nt
Tamper s
Availabil
Resista
i ty
n ce

Trust
Secure
Manage
Storag Secure
men
e Software
Executi t
o nAchaliya, SNJB's CoE, Chandwad
Parag
March 16, 2018 12
( Nashik )
Security Requirements

• Access Control
– Provides authorized access to network resources
– IoT is ad-hoc, and dynamic in nature
– Efficient & robust mechanism of secure access to resources
must be deployed with distributed nature
• Authentication
– Identity establishment b/w communicating devices
– Due to diversity of devices & end users, an attack resistant
and lightweight solution for authentication
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 13
( Nashik )
Security Requirements

• Data Confidentiality
– Protecting data from unauthorized disclosure
– Secure, lightweight, and efficient key exchange mechanism is
required
• Availability
– Ensuring no denial of authorized access to network resources
Security Requirements

• Trust Management
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 14
( Nashik )
– Decision rules needs to be evolved for trust management in
IoT
• Secure Software Execution
– Secure, managed-code, runtime environment designed to
protect against different applications
• Secure Storage
– Involves confidentiality and integrity of sensitive information
stored in the system
Security Requirements

• Tamper Resistance

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 15
( Nashik )
– Desire to maintain security requirements even when device
falls into hands of malicious parties
– Can be physically or logically probed
• Scalability
– IoT consist of various types of devices with different
capabilities from intelligent sensors and
actuators, to home appliances
– Communication (wire or wireless) & protocols (Bluetooth,
ZigBee, RFID, Wi-Fi, etc.)
Security Requirements

• Flexibility and Adaptability


Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 16
( Nashik )
– IoT will consist of mobile communication devices
– Can roam around freely from one type of environment to
others
– With different type of risks and security threats
– So users are likely to have different privacy profile depending
on environment
Security Architecture for IoT

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 17
( Nashik )
Threat Modeling
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 18
( Nashik )
• Presented by first defining misuse case

• Means negative scenario describing the ways the system should


not work

• And then standard use case

• Assets to be protected in IoT will vary with respect to every


scenario case
Threat Analysis

• Assets needs to be identified to drive threat analysis process

• Smart home is localized in space, provide services in a household

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 19
( Nashik )
• Devices in Smart Home are combined with n/w

• Provide means for entertainment, monitoring of appliances,


controlling of house components and other services
Use Cases and Misuse Cases

• Actor in use case and misuse case in the scenario of smart home
includes:
– Infrastructure owner (smart home)
– IoT entity (smartphone device or software agent)
– Attacker (misuser)
– Intruder (exploiter)
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 20
( Nashik )
Use Cases and Misuse Cases

• Access rights granted to unauthorized entity

• Corruption of access credentials

• Unauthorized data transmission

• Denial of service (DoS) attack

• Man-in-the-middle attack
IoT Security Tomography

• Classified according to attacks addressing to different layers


Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 21
( Nashik )
– Transport Layer
– Network Layer
– MAC layer
– RF layer
IoT Security Tomography

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 22
( Nashik )
Key Elements of Security
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 23
( Nashik )
• Authentication

• Access Control

• Data and Message Security

• Prevention from denial of taking part in a transaction


Identity Establishment

• Secure Entity Identification or Authentication

• Authentication is identity establishment between communicating


devices or entities

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 24
( Nashik )
• Entity can be a single user, a set of users, an entire organization
or some networking device
• Identity establishment is ensuring that origin of electronic
document & message is correctly identified
Access Control

• Also known as access authorization

• Principles is to determine who should be able to access what

• Prevents unauthorized use of resources

• To achieve access control, entity which trying to gain access


must be authenticated first
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 25
( Nashik )
• According to authentication, access rights can be modified to the
individual
Data and Message Security

• Related with source authenticity, modification detection and


confidentiality of data

• Combination of modification & confidentiality of message is not


enough for data integrity

• But origin of authenticity is also important

• Location privacy is equally important risk in IoT

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 26
( Nashik )
• Should not be any way for attacker to reveal identity or location
information of device
Non-repudiation and Availability

• Non-repudiation is the security services for point-to-point


communications

• Process by which an entity is prevented from denying a


transmitted message

• So when message is sent, receiver can prove that initiating sender


only sent that message

• Sender can prove that receiver got message

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 27
( Nashik )
• To repudiate means to deny
Non-repudiation and Availability

• Availability is ensured by maintaining all h/w, repairing


immediately whenever require

• Also prevents bottleneck occurrence by keeping emergence


backup power systems

• And guarding against malicious actions like Denial of Service


(DoS) attack
Security Model for IoT

Parag Achaliya, SNJB's CoE, Chandwad


March 16, 2018 28
( Nashik )
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 29
( Nashik )

You might also like