0% found this document useful (0 votes)
0 views

08_Fundemental of IoT Security

Uploaded by

amr hassan
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

08_Fundemental of IoT Security

Uploaded by

amr hassan
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

FUNDAMENTALS OF IoT SECURITY

A Beginner’s Guide to Internet of Things Security Attacks, Applications,


Authentication, and Fundamentals
Introduction
• To implement IoT in real time, we need to
integrate it with other existing technologies.
• IoT does not have a fixed architecture yet.
• The existing idea of IoT architecture has three
layers:
– Perception layer, network layer, and application layer.
• Each layer has its own security issues that need to
be resolved to facilitate its growth.
• We need security mechanisms at every layer of
IoT to prevent any security and privacy threats.
Security at Different Layers
• Each layer of IoT architecture has some security- and privacy-
related issues.
– Issues required to be addressed in order to secure IoT applications.
• The existing IoT architecture raises the requirement of proper
security checks during the beginning and at regular intervals
for an IoT network as a whole.
• At the network layer, threats to confidentiality, integrity, and
availability should be dealt with.
– Eavesdropping, man-in-the-middle, DoS/DDoS, and network intrusion
• The application layer needs different security standards as
per the application requirements.
– Securing the applications are hard and complicated.
System Requirements of the IoT System
• In order to ensure the security of an IoT system,
we can ensure the basic security requirements at
the RFID level.
• The following considered to be basic criteria that
must be fulfilled by the protocol to protect security
attacks on a system:
– Mutual authentication
– Anonymity
– Forward secrecy
– Confidentiality
– Availability
Mutual Authentication
• Two sides of a communications channel verify
each other's identity, instead of only one side
verifying the other.
• Mutual authentication is also known as "two-way
authentication" because the process goes in both
directions.
• The server should authenticate the tag to be
legitimate and tag should also authenticate the
server before they exchange any important
information.
Mutual Authentication
Anonymity
• Refers to concealing the identity from any adversary by
an encryption technique.
• Strong anonymity
– If the attacker is not able to trace back the tag with the help of
its communication with the tag.
Forward Secrecy

• It ensures that some compromised present


communication information could not be used to
obtain past.
• By generating a unique session key for every
session a user initiates, the compromise of a
single session key will not affect any data other
than that exchanged in the specific session
protected by that particular keycommunication
information.
• Protects past sessions against future
Confidentiality
• It ensures that all the information is transferred secretly
without getting revealed to anyone except the receiver.
Availability
• It ensures that the authentication protocol works all the
time, thus not causing desynchronization between the
tag and the server.
Current scenario of security and trust management
• Food Industry integrate the Radio Frequency Identification(RFID)
with Wireless Sensor Network (WSN).
– Automate the food monitoring, tracking, and measuring the quality of food
of any food supply chain
• RFID technology, which is a primary enabler for IoT, has also seen
a rapid growth in the last couple of years.
• Retail management, transportation and logistics, and healthcare.
RFID
• With the increasing use of RFID, the maintenance of
security and data privacy has also become a chief
concern.
• RFID systems are always deployed in bulk;
– These systems comprise a set of tags that have some storage
and computational capabilities.
• RFID tags are monitored and identified using readers
equipped with transponders to communicate with these
tags
• RFID systems are being used in retail at large scales
replacing barcodes due to their resistance to tampering
and ease of reading.

You might also like