0% found this document useful (0 votes)
6 views12 pages

08_Fundemental of IoT Security

Uploaded by

amr hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views12 pages

08_Fundemental of IoT Security

Uploaded by

amr hassan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

FUNDAMENTALS OF IoT SECURITY

A Beginner’s Guide to Internet of Things Security Attacks, Applications,


Authentication, and Fundamentals
Introduction
• To implement IoT in real time, we need to
integrate it with other existing technologies.
• IoT does not have a fixed architecture yet.
• The existing idea of IoT architecture has three
layers:
– Perception layer, network layer, and application layer.
• Each layer has its own security issues that need to
be resolved to facilitate its growth.
• We need security mechanisms at every layer of
IoT to prevent any security and privacy threats.
Security at Different Layers
• Each layer of IoT architecture has some security- and privacy-
related issues.
– Issues required to be addressed in order to secure IoT applications.
• The existing IoT architecture raises the requirement of proper
security checks during the beginning and at regular intervals
for an IoT network as a whole.
• At the network layer, threats to confidentiality, integrity, and
availability should be dealt with.
– Eavesdropping, man-in-the-middle, DoS/DDoS, and network intrusion
• The application layer needs different security standards as
per the application requirements.
– Securing the applications are hard and complicated.
System Requirements of the IoT System
• In order to ensure the security of an IoT system,
we can ensure the basic security requirements at
the RFID level.
• The following considered to be basic criteria that
must be fulfilled by the protocol to protect security
attacks on a system:
– Mutual authentication
– Anonymity
– Forward secrecy
– Confidentiality
– Availability
Mutual Authentication
• Two sides of a communications channel verify
each other's identity, instead of only one side
verifying the other.
• Mutual authentication is also known as "two-way
authentication" because the process goes in both
directions.
• The server should authenticate the tag to be
legitimate and tag should also authenticate the
server before they exchange any important
information.
Mutual Authentication
Anonymity
• Refers to concealing the identity from any adversary by
an encryption technique.
• Strong anonymity
– If the attacker is not able to trace back the tag with the help of
its communication with the tag.
Forward Secrecy

• It ensures that some compromised present


communication information could not be used to
obtain past.
• By generating a unique session key for every
session a user initiates, the compromise of a
single session key will not affect any data other
than that exchanged in the specific session
protected by that particular keycommunication
information.
• Protects past sessions against future
Confidentiality
• It ensures that all the information is transferred secretly
without getting revealed to anyone except the receiver.
Availability
• It ensures that the authentication protocol works all the
time, thus not causing desynchronization between the
tag and the server.
Current scenario of security and trust management
• Food Industry integrate the Radio Frequency Identification(RFID)
with Wireless Sensor Network (WSN).
– Automate the food monitoring, tracking, and measuring the quality of food
of any food supply chain
• RFID technology, which is a primary enabler for IoT, has also seen
a rapid growth in the last couple of years.
• Retail management, transportation and logistics, and healthcare.
RFID
• With the increasing use of RFID, the maintenance of
security and data privacy has also become a chief
concern.
• RFID systems are always deployed in bulk;
– These systems comprise a set of tags that have some storage
and computational capabilities.
• RFID tags are monitored and identified using readers
equipped with transponders to communicate with these
tags
• RFID systems are being used in retail at large scales
replacing barcodes due to their resistance to tampering
and ease of reading.

You might also like