Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12
FUNDAMENTALS OF IoT SECURITY
A Beginner’s Guide to Internet of Things Security Attacks, Applications,
Authentication, and Fundamentals Introduction • To implement IoT in real time, we need to integrate it with other existing technologies. • IoT does not have a fixed architecture yet. • The existing idea of IoT architecture has three layers: – Perception layer, network layer, and application layer. • Each layer has its own security issues that need to be resolved to facilitate its growth. • We need security mechanisms at every layer of IoT to prevent any security and privacy threats. Security at Different Layers • Each layer of IoT architecture has some security- and privacy- related issues. – Issues required to be addressed in order to secure IoT applications. • The existing IoT architecture raises the requirement of proper security checks during the beginning and at regular intervals for an IoT network as a whole. • At the network layer, threats to confidentiality, integrity, and availability should be dealt with. – Eavesdropping, man-in-the-middle, DoS/DDoS, and network intrusion • The application layer needs different security standards as per the application requirements. – Securing the applications are hard and complicated. System Requirements of the IoT System • In order to ensure the security of an IoT system, we can ensure the basic security requirements at the RFID level. • The following considered to be basic criteria that must be fulfilled by the protocol to protect security attacks on a system: – Mutual authentication – Anonymity – Forward secrecy – Confidentiality – Availability Mutual Authentication • Two sides of a communications channel verify each other's identity, instead of only one side verifying the other. • Mutual authentication is also known as "two-way authentication" because the process goes in both directions. • The server should authenticate the tag to be legitimate and tag should also authenticate the server before they exchange any important information. Mutual Authentication Anonymity • Refers to concealing the identity from any adversary by an encryption technique. • Strong anonymity – If the attacker is not able to trace back the tag with the help of its communication with the tag. Forward Secrecy
• It ensures that some compromised present
communication information could not be used to obtain past. • By generating a unique session key for every session a user initiates, the compromise of a single session key will not affect any data other than that exchanged in the specific session protected by that particular keycommunication information. • Protects past sessions against future Confidentiality • It ensures that all the information is transferred secretly without getting revealed to anyone except the receiver. Availability • It ensures that the authentication protocol works all the time, thus not causing desynchronization between the tag and the server. Current scenario of security and trust management • Food Industry integrate the Radio Frequency Identification(RFID) with Wireless Sensor Network (WSN). – Automate the food monitoring, tracking, and measuring the quality of food of any food supply chain • RFID technology, which is a primary enabler for IoT, has also seen a rapid growth in the last couple of years. • Retail management, transportation and logistics, and healthcare. RFID • With the increasing use of RFID, the maintenance of security and data privacy has also become a chief concern. • RFID systems are always deployed in bulk; – These systems comprise a set of tags that have some storage and computational capabilities. • RFID tags are monitored and identified using readers equipped with transponders to communicate with these tags • RFID systems are being used in retail at large scales replacing barcodes due to their resistance to tampering and ease of reading.
Instant Download A Beginner s Guide to Internet of Things Security Attacks Applications Authentication and Fundamentals 1st Edition Gupta PDF All Chapters