Unit 3 Iot Protocols and Security
Unit 3 Iot Protocols and Security
IOT a consortium
• This consortium consists of 17 European organizations from nine countries developed reference
architecture, models, procedure and different technologies which are used for developing an IOT
product
• They developed 2 deliverables-work package and study group. All these deliverables contain all
the standards and specifications for developing an IOT product.
to another form-All sensors and actuators are transducers. Each sensor carries a memory chip. That chip
contains all the info about sensor. .It can communicates its info to all other devices.
transportation, oil and gas, power distribution, water control and etc.
Inputs
Inputs (either digital or analog) and output relays or electrical signals that directly interface with
managed elements in the remote sites. That's where the SCADA functions start.
These sensors and control relays perform the data acquisition but can't interpret communication
protocols on their own. But your SCADA system still needs a way to collect this data and report
it to you in a meaningful way. That's where RTUs come into play.
Remote Telemetry Units (RTUs)
Just like Programmable Logic Controllers (PLC), RTUs are small computerized units deployed
in the field at specific sites and locations. Remote telemetry unit, also known as a remote
terminal unit (RTU), serves as local collection points for gathering reports from sensors and
delivering commands to control relays.
RFID
Radio Frequency Identification – or RFID – is used to automatically identify an object and capturing data
about that object that has been stored in a small microchip tag and attached to the object. The RFID tag has
a built-in antenna that communicates to a scanning device that reads the data remotely. The data is then
Using radio waves and electromagnetic fields to send data, an RFID tag and the system that reads it
consists of three main components.
Component #1 – the RFID tag: there are two types of RFID tags, passive and active. A passive RFID tag
is the barcode you see in the supermarket. It is assigned to an item, it is easy to activate, and it does not
have a power supply. An active RFID tag, like the sensor tag in the back of a library book, has a microchip
that collects information about the asset and may also contain an antenna or on-board sensor.
Component #2 – the RFID reader: An RFID reader is a device that scans the RFID tag and collects
information about the asset the tag is attached to. These readers can be hand-held or wired, and work with
RFID can be used to record and control the movement of assets and personnel. You’ve probably seen
RFID tags on the back of your library books, or even in the new biometric passports. It makes tracking
assets contained in boxes or pallets easier to manage.
When used in IoT, RFID tags are handy in cameras, GPS, and other smart sensors. Thy can help identify
and locate objects. It is an inexpensive way to turn objects in the home “smart,” like the popular line of
Google Nest products. Some healthcare systems are using RFID tags to track patients and their medical
• Many standardization efforts have been trying to define unified data representation, protocol for
IoT.
• Before IoT, Internet was actually an Internet of documents or of multimedia documents.
• Two pillars of Internet including HTML/HTTP turned the Internet into WWW.
• We need to turn the IoT into the WoT.
• What will it take to make this to happen?
• That’s why we need something like HTTP, a universal way to transfer data in text, images,
sound, and other media elements so that devices communicate with each other.
The Web of Things – or WoT – is what fills this vacuum by using and adapting Web protocols to
connect anything in the physical world and give it a presence on the World Wide Web!
Web of Things (WoT) refers to a set of standards formed by the world wide web consortium (W3C)
to facilitate the interoperability, fragmentation, and usability of the Internet of Things (IoT).
In other words, it is a subset of the internet of things (IoT) and is built around software standards
such as REST, HTTP, and URIs to allow devices to interact with one another.
• MAC enables transmission of MAC frames through the use of the physical channel
BACNet Protocol
• BACnet is a network protocol used in building automation systems (BAS) to control the data
exchange between different devices and components.
• Utilizing a building automation system is a top choice for many industries, and the need to
implement it efficiently is essential.
• In every building automation system, communication plays a key factor in its success.
Communication should be timely and error-free. This is only possible if all manufacturers follow
the same set of rules, known as a network protocol. If network protocol isn’t followed, it can
waste essential information, resulting in wrong decisions.
• Designed to allow communication of building automation & control system for application like
Heating, Ventilating and Air-conditioning Control (HVAC)
Modbus
Modbus is a data communication protocol that allows devices to
exchange information over various types of media, including serial
lines, Ethernet, and wireless
• Modbus RTU
• Modbus ASCII
• Modbus TCP/IP or Modbus TCP
• Modbus over TCP/IP or Modbus over TCP or Modbus RTU/IP
• Modbus over UDP
• Modbus Plus (Modbus+, MB+ or MBP)
• Pemex Modbus
20 March 2018 Unit 4 - IoT Protocols and Security 24
• Enron Modbus
KNX Protocol
The KNX protocol is an open-source standard for building automation and home control systems
that allows devices and systems to communicate with each other:
Purpose
KNX is used to manage and control building systems, such as lighting, heating, ventilation, security,
and audiovisual equipment.
KNX is a single language that allows all components of a building automation system to
communicate with each other, even if they use different coding languages. KNX can be installed in
new buildings or retrofitted into existing ones, and can use wired or wireless transmission media.
Zigbee Applications:
• End Node
• Each end node or end device can have multiple EPs
• Each EP contains an application profile, such as home
automation
20 March 2018 Unit 4 - IoT Protocols and Security 37
• can be used to control multiple devices or single device
• ZigBee Addressing Mode
• ZigBee uses direct, group, and broadcast addressing for
transmission of information
Vulnerabilities of IoT
• DoS Attack
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 7
( Nashik )
– Denial of Service (DoS)
– Makes an attempt to prevent authentic user from accessing
services which they are eligible for
– For example, unauthorized user sends to many requests to
server
– That flood the network and deny other authentic users from
access to the network
Vulnerabilities of IoT
• DDoS Attack
– Distributed Denial of Service
Data
Scalabilit
Confiden
y
tiality
Security
Requirem
e nt
Tamper s
Availabil
Resista
i ty
n ce
Trust
Secure
Manage
Storag Secure
men
e Software
Executi t
o nAchaliya, SNJB's CoE, Chandwad
Parag
March 16, 2018 12
( Nashik )
Security Requirements
• Access Control
– Provides authorized access to network resources
– IoT is ad-hoc, and dynamic in nature
– Efficient & robust mechanism of secure access to resources
must be deployed with distributed nature
• Authentication
– Identity establishment b/w communicating devices
– Due to diversity of devices & end users, an attack resistant
and lightweight solution for authentication
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 13
( Nashik )
Security Requirements
• Data Confidentiality
– Protecting data from unauthorized disclosure
– Secure, lightweight, and efficient key exchange mechanism is
required
• Availability
– Ensuring no denial of authorized access to network resources
Security Requirements
• Trust Management
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 14
( Nashik )
– Decision rules needs to be evolved for trust management in
IoT
• Secure Software Execution
– Secure, managed-code, runtime environment designed to
protect against different applications
• Secure Storage
– Involves confidentiality and integrity of sensitive information
stored in the system
Security Requirements
• Tamper Resistance
• Actor in use case and misuse case in the scenario of smart home
includes:
– Infrastructure owner (smart home)
– IoT entity (smartphone device or software agent)
– Attacker (misuser)
– Intruder (exploiter)
Parag Achaliya, SNJB's CoE, Chandwad
March 16, 2018 20
( Nashik )
Use Cases and Misuse Cases
• Man-in-the-middle attack
IoT Security Tomography
• Access Control