SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 1
Instructor Materials
Chapter 4: Networks, Fog
and Cloud Computing
IoT Fundamentals
Connecting Things 2.01
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 14
Chapter 4: Networks, Fog
and Cloud Computing
IoT Fundamentals
Connecting Things 2.01
Presentation_ID 15
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 4 - Sections & Objectives
 4.1 Connecting Things to the Network
• Explain how the network supports the IoT.
 4.2 Fog and Cloud Computing
• Explain why fog and cloud computing are used in IoT systems.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 16
4.1 Connecting Things to
the Network
Presentation_ID 17
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
4.1.1 The Role of the Network
 LAN and WAN
• The path from source to destination can be a single cable or a collection of networks.
• A Personal Area Network (PAN) is a type of network that usually spans a few meters
around an individual and is often used in IoT.
• A Local Area Network (LAN) is a type of network infrastructure that spans a small
geographical area and is used to connect end devices..
• A LAN is normally a high-speed network under the control of a single administrative
entity.
• A Wide Area Network (WAN) is a type of network infrastructure that spans a wide
geographical area and is used to connect WANs.
• A WAN is normally a low-speed network and may include portions from different
Internet Service Providers (ISPs)
• LANs often connect machines in the factory plant.
• WAN devices have evolved to create Low
PowerWide Area Networks (LPWAN) for use in
the IOT
Presentation_ID 18
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
The Role of the Network (Cont.)
 Network Devices and Communication Media
• Network devices are devices that connect to each other through a network.
• An end device is either the source or destination of a message transmitted over the
network.
• Intermediary devices connect the individual end devices to the network and can connect
multiple individual networks to form an internetwork.
• Network addresses are used to uniquely identify devices on a network.
• Network media provide the physical channel over
which the message travels from source to destination.
Presentation_ID 19
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
The Role of the Network (Cont.)
 Network Protocols
• Devices must conform to common protocols before they can communicate.
• Two very important network protocols are Ethernet and IP.
• Ethernet rules enable communication between local devices.
• IP enable communication between remote devices.
 Basic Routing
• Network packets must often transverse several networks to get to the destination.
• Routing is the process of directing a network packet to its destination.
• Routers are intermediary network devices that perform routing.
 LANs, WANs and the Internet
• Single router designs are common in SOHO.
• The single router connects SOHO devices to the
Internet.
• The single router is the default gateway for all
SOHO devices.
Presentation_ID 20
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
The Role of the Network (Cont.)
 IoT Protocols
• IoT Devices are often embedded devices designed to work in sub-optimal conditions.
• These devices require specialized protocols to function with low power and limited
connectivity.
• IoT devices use CoAP (Constrained Application Protocol) and MQTT (Message Queuing
Telemetry Transport).
 Securing the Network
• IoT devices are integrated into all
aspects of daily life.
• IoT applications carry traceable
signatures and carry confidential data.
• IoT devices must adhere to a secure
framework (Authentication,
Authorization, Network Enforced Policy,
Secure Analytics)
Presentation_ID 21
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
4.1.2 Wireless Technologies
 WiFi
• Wireless connectivity is the biggest growth area.
• New protocols created/updated to support diverse IoT devices: ZigBee, Bluetooth,
4G/5G, LoRaWAN
• Protocols created for short, medium, and wide ranges
• Low-Power Wide-Area Networks (LPWAN) is designed to support long range
communications for low bit rate devices such as sensors, actuators, and controllers
Presentation_ID 22
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
Wireless Technologies (cont’d)
 ZibBee
• A low-energy, low-power, low-data rate wireless protocol specification used to create
personal area networks
• Areas of utilization: home automation, medical device data collection, and other low-
power low-bandwidth needs
• 250 kbps transfer rate best suited for intermittent data transmissions
• Every ZigBee data request uses an Application Profile Identification Number.
• Application profile ID numbers - 16-bit
numbers that relate to public profiles,
manufacturing profiles, or private profiles.
• ZigBee version 1.2 has a number of serious
and exploitable security vulnerabilities.
Most of these protocol design flaws relate
to attempts to make it easier for the
end-user to add a ZigBee device to the
ZigBee network.
Presentation_ID 23
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
Wireless Technologies (cont’d)
 Bluetooth
• Wireless protocol used for data communication over short distances (PAN)
• Supported by almost all mobile devices and accessories - the defacto standard for
audio between mobile devices.
• Bluetooth Low Energy (BLE) - very popular because of the smartphone industry and
new applications in healthcare, fitness, and beacons.
o operates in the 2.4 GHz ISM band
o Has a very fast connection rate (milliseconds) and a very high data rate (1 Mbps).
o The BLE device then goes into “sleep mode” until a connection is reestablished -
lengthens the battery life for several years.
• Beacons use BLE technology - positioned on buildings,
in coffee shops, and on light posts to provide location
services.
Presentation_ID 24
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
Wireless Technologies (cont’d)
 4G/5G
• Cellular-based data networks designed to take advantage of communications over
large geographic areas
• High mobility bandwidth (trains and cars) of 4G system is 100 Mbps
• Low mobility (pedestrians and stationary users) of 4G systems is 1 Gbps
• 4G provides support for voice, IP telephony, mobile Internet access, video calling,
gaming services, cloud computing, high-definition mobile TV, and mobile 3D TV.
• Long Term Evolution (LTE) and WiMAX (IEEE 802.16e) are two popular 4G systems.
• LTE 4G technology release 13e
includes the standardization of
NarrowBand IoT (NB-IoT) - an
LPWAN technology.
• Next Generation Mobile Networks
Alliance defining the standards and
requirements for 5G
Presentation_ID 25
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
Wireless Technologies (cont’d)
 LoRaWAN
• Wireless technology designed to provide wireless WAN connections to
power constricted devices.
• targets key requirements of the Internet of Things such as secure bi-
directional communication, mobility and localization services.
• Architecture is often an extended star topology in which gateways relay
messages between end-devices and a central network server is located in
the backend.
• Data rates range from 0.3 kbps to 50 kbps
• Security is built into the LoRaWAN standard, implemented in a multi-layer
encryption scheme.
o Unique keys are used in the Application, Network, and Device layers.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 26
4.2 Fog and Cloud
Computing
Presentation_ID 27
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
4.2.1 Fog and Cloud Services
 Cloud Computing Model
• On-demand access to a shared pool of configurable
computing resources.
• Resources can be made available quickly with
minimal management effort.
• Cloud service providers use data centers for
their cloud services and cloud-based resources.
• “Pay-as-you-go” model treats computing and
storage expenses as a utility.
• Enables access to organizational data and
applications anywhere and at any time
• Reduces cost for equipment, energy, physical plant
requirements, and personnel training needs
• Cloud services offered: Infrastructure as a Service (IaaS), Platform and mobile Platform as
a Service (PaaS) (mPaaS), Software as a Service (SaaS)
Presentation_ID 28
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
Fog and Cloud Services (cont’d)
 Cloud Services
• Cloud customers have access to a shared pool of configurable computing resources that
can be rapidly provisioned and released with minimal management effort.
• Extends functionality of an IoT system: data processing and storage done in the cloud
instead of in the IoT devices.
• Data and resources - always available to any device in the system as long as the device
has Internet connectivity
• Cloud service providers are also very serious
about security, ensuring customer data is
kept safe and secure..
• Examples of cloud services: Amazon AWS,
IFTTT, Zapier, Built.io, Webex Teams
Presentation_ID 29
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
Fog and Cloud Services (cont’d)
Presentation_ID 30
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
Fog and Cloud Services (cont’d)
 Fog Computing Model
• Distributed computing infrastructure closer to the network edge.
• Edge devices run applications locally and make immediate decisions
• Reduces the data burden on networks as raw data not sent over network connections.
• Enhances security - keeping sensitive data from being transported beyond the edge where
it is needed.
• Fog applications monitor or analyze real-time
data from network-connected things and then
take action such as locking a door, changing
equipment settings, applying the brakes on a
train, zooming in with a video camera,
• The action can involve machine-to-machine
(M2M) communications and machine-to-people
(M2P) interaction
• Cisco predicts that 40% of IoT-created data
will be processed in the fog by 2018
Presentation_ID 31
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
4.2.2 Big Data (cont’d)
 Data Growth
• Number of sensors and other IoT end devices growing exponentially
and collecting a constant stream of data.
• Consumer behavior is changing requires anytime, anywhere, on-
demand access.- fitness monitors, smartphones, medical devices
• Smart cities and smart grids, connected trains, cars – growing in
frequency
• Problems arise in terms
of the requirements for
storage, analysis, and
security
Presentation_ID 32
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
4.2.2 Big Data (cont’d)
 It is All About the Data
• Big data is data that is so vast and complex it is difficult to store,
process, and analyze using traditional data storage and analytics
applications.
• Typically characterized in three dimensions: volume, velocity, and
variety
o Volume - the amount of data being transported and stored
o Velocity - the rate at which this data is generated
o Variety - the type of data, which is rarely in a state that is
perfectly ready for processing and
analysis
• Apache Hadoop, Webex Teams, Cassandra,
and Kafka – examples of open source
projects dealing with Big Data
Presentation_ID 33
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
4.2.3 Security Concerns in the IoT
 Data Storage
• IoT devices may store data for a period of time before sending it out for processing. –
especially for devices that do not maintain constant connections to their gateways or
controllers.
• Critical that all IoT storage devices encrypt data for storage to avoid data tampering
or theft
• Self-encrypting drives have encryption capability built into the drive controller -
encryption and decryption done by the drive itself, independent of the operating
system.
• Self-encrypting flash memory –
manufacturers beginning to release
new devices with self-encrypting
flash memory
Presentation_ID 34
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connecting Things to the Network
4.2.3 Security Concerns in the IoT (cont’d)
 Data Transmission
• If data is not properly secured through encryption, it can be intercepted, captured or
manipulated while in transit.
• Modern encryption algorithms may require more processing power than what is
available in the IoT device.
• As well as physical security, IoT devices must be able to protect its own firmware and
the data it transmits.
• Ensure that IoT devices are running the latest version of their firmware and protocols.
• Common attack: trick devices into using sub-optimal security parameters under
which the connection can be exploited
• Servers, cloud endpoints,
intermediary devices should also
be secured and use strong
encryption algorithms before
communicating with IoT devices.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 35
4.3 Chapter Summary
Presentation_ID 36
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Personal information related to health, location, wealth, personal preferences and behaviors is
passing through the IoT devices in increasing volumes. This increase in volume elevates the
relevance of increasing the attention on data privacy and data protection.
 New wireless technologies and protocols, such as ZigBee, Bluetooth, 4G/4G, and LoRaWAN,
have been developed to accommodate the diversity of IoT devices. Wireless technology is
selected based on the range of coverage, bandwidth requirements, power consumption, and
deployment location.
 Wireless security considerations include: selecting a secure protocol, protection for management
frames, identification of frequency jamming, detecting rogue access points, and using security at
the application layer.
 Cloud computing is a service that offers off-premise, on-demand access to a shared pool of
configurable computing resources. Cloud computing offers services such as IaaS, PaaS, mPaaS
and SaaS.
 A fog computing model identifies a distributed computing infrastructure closer to the network
edge. It enables edge devices to run applications locally and make immediate decisions.
 The proliferation of devices in the IoT is one of the primary reasons for the exponential growth in
data generation. Data can be deemed at rest or in motion. Big Data is typically characterized in
three dimensions: volume, velocity, and variety.
 Data stored in servers must be encrypted to avoid data tampering or theft. Regular backups are
mandatory to minimize losses in case of a disaster
 IoT devices should run the latest version of firmware and protocols and any communication
between devices should be done using protocols that provide secure encryption by default.
Chapter Summary
Summary
Presentation_ID 37
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 38
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

PPTX
Рељеф Србије 2
PPTX
Kodeks ponašanja u školi.pptx
PDF
Digitalno nasilje - vodič za roditelje
PPTX
Uticaj tehnologije na zdravlje 5 razred
PPT
Osnovni principi zdrave ishrane- Milica Milovanović
PPT
Egypt - Egipat
PPTX
Jezera Srbije Tanja Gagić
PPTX
Zagađenje vode......
Рељеф Србије 2
Kodeks ponašanja u školi.pptx
Digitalno nasilje - vodič za roditelje
Uticaj tehnologije na zdravlje 5 razred
Osnovni principi zdrave ishrane- Milica Milovanović
Egypt - Egipat
Jezera Srbije Tanja Gagić
Zagađenje vode......

What's hot (20)

PPTX
SAVE WATER SAVE LIFE
PPT
Uticaj racunara na zdravlje ljudi i zivotnu sredinu
PPTX
Južna Azija
PPT
Sekundarni sektor
PPTX
Francuska
PPTX
Pravila za izradu kvalitetne prezentacije
PPTX
Pojacan-vaspitni-rad (1).pptx
PPTX
Ziva i neziva priroda
PPTX
Karol Marija fon veder
PPTX
Indonezija
PDF
PPTX
Natural vegetation and wildlife ppt
PPTX
SVETSKI DAN HRANE 16.10.13.
PPSX
Water Conservation
PPT
Аустралија- природне и друштвене одлике
PPTX
Prometna Učilica: Pristojno ponašanje u sredstvima javnog prijevoza
PPT
PPS
Vode tekucice
PPTX
Azija- društvene odlike
PPTX
Zdrava ishrana
SAVE WATER SAVE LIFE
Uticaj racunara na zdravlje ljudi i zivotnu sredinu
Južna Azija
Sekundarni sektor
Francuska
Pravila za izradu kvalitetne prezentacije
Pojacan-vaspitni-rad (1).pptx
Ziva i neziva priroda
Karol Marija fon veder
Indonezija
Natural vegetation and wildlife ppt
SVETSKI DAN HRANE 16.10.13.
Water Conservation
Аустралија- природне и друштвене одлике
Prometna Učilica: Pristojno ponašanje u sredstvima javnog prijevoza
Vode tekucice
Azija- društvene odlike
Zdrava ishrana
Ad

Similar to Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx (20)

PDF
ch5-Fog Networks and Cloud Computing
PPTX
INTERNET OF THINGS.pptx
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
PDF
Introduction to IoT Technologies - The need to know basics
PPTX
Unit 4 Introduction to internet of Things.pptx
PDF
Unit 4 Internet of Things communication models.pdf
PDF
CCNA Modulo 1 capitulo 1.pdf
PPTX
PDF
IOT_MODULE_3.pdf simple example notes for use
PPTX
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
PDF
Iot architectures slides important.pdf
PPTX
Evolution of IoT with the sir of gujarat university
PPTX
Unit - 1.pptx
PPTX
CCNA4 Verson6 Chapter1
PDF
About IoT Protocols and Security Techniques
PPTX
CertifiedNv6_instructorPPT_Chapter1.pptx
PDF
IoT-CT internet of thing master séminaire cours.pdf
PPTX
IOT PROTOCOLS.pptx
PDF
Internet of things chapter2.pdf
PPTX
ch2.pptxnnbhyyg uuggy jgugjb huuuhj hihij
ch5-Fog Networks and Cloud Computing
INTERNET OF THINGS.pptx
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
Introduction to IoT Technologies - The need to know basics
Unit 4 Introduction to internet of Things.pptx
Unit 4 Internet of Things communication models.pdf
CCNA Modulo 1 capitulo 1.pdf
IOT_MODULE_3.pdf simple example notes for use
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
Iot architectures slides important.pdf
Evolution of IoT with the sir of gujarat university
Unit - 1.pptx
CCNA4 Verson6 Chapter1
About IoT Protocols and Security Techniques
CertifiedNv6_instructorPPT_Chapter1.pptx
IoT-CT internet of thing master séminaire cours.pdf
IOT PROTOCOLS.pptx
Internet of things chapter2.pdf
ch2.pptxnnbhyyg uuggy jgugjb huuuhj hihij
Ad

Recently uploaded (20)

PPTX
Fluid Mechanics, Module 3: Basics of Fluid Mechanics
PPT
Chapter 6 Design in software Engineeing.ppt
PDF
Monitoring Global Terrestrial Surface Water Height using Remote Sensing - ARS...
PDF
July 2025: Top 10 Read Articles Advanced Information Technology
PPTX
Glazing at Facade, functions, types of glazing
PDF
Geotechnical Engineering, Soil mechanics- Soil Testing.pdf
PPT
Drone Technology Electronics components_1
PDF
International Journal of Information Technology Convergence and Services (IJI...
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
The-Looming-Shadow-How-AI-Poses-Dangers-to-Humanity.pptx
PDF
ETO & MEO Certificate of Competency Questions and Answers
PPTX
ANIMAL INTERVENTION WARNING SYSTEM (4).pptx
PDF
classification of cubic lattice structure
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
algorithms-16-00088-v2hghjjnjnhhhnnjhj.pdf
PDF
Queuing formulas to evaluate throughputs and servers
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Road Safety tips for School Kids by a k maurya.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
BRKDCN-2613.pdf Cisco AI DC NVIDIA presentation
Fluid Mechanics, Module 3: Basics of Fluid Mechanics
Chapter 6 Design in software Engineeing.ppt
Monitoring Global Terrestrial Surface Water Height using Remote Sensing - ARS...
July 2025: Top 10 Read Articles Advanced Information Technology
Glazing at Facade, functions, types of glazing
Geotechnical Engineering, Soil mechanics- Soil Testing.pdf
Drone Technology Electronics components_1
International Journal of Information Technology Convergence and Services (IJI...
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
The-Looming-Shadow-How-AI-Poses-Dangers-to-Humanity.pptx
ETO & MEO Certificate of Competency Questions and Answers
ANIMAL INTERVENTION WARNING SYSTEM (4).pptx
classification of cubic lattice structure
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
algorithms-16-00088-v2hghjjnjnhhhnnjhj.pdf
Queuing formulas to evaluate throughputs and servers
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Road Safety tips for School Kids by a k maurya.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
BRKDCN-2613.pdf Cisco AI DC NVIDIA presentation

Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Instructor Materials Chapter 4: Networks, Fog and Cloud Computing IoT Fundamentals Connecting Things 2.01
  • 2. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 14 Chapter 4: Networks, Fog and Cloud Computing IoT Fundamentals Connecting Things 2.01
  • 3. Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 4 - Sections & Objectives  4.1 Connecting Things to the Network • Explain how the network supports the IoT.  4.2 Fog and Cloud Computing • Explain why fog and cloud computing are used in IoT systems.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 16 4.1 Connecting Things to the Network
  • 5. Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network 4.1.1 The Role of the Network  LAN and WAN • The path from source to destination can be a single cable or a collection of networks. • A Personal Area Network (PAN) is a type of network that usually spans a few meters around an individual and is often used in IoT. • A Local Area Network (LAN) is a type of network infrastructure that spans a small geographical area and is used to connect end devices.. • A LAN is normally a high-speed network under the control of a single administrative entity. • A Wide Area Network (WAN) is a type of network infrastructure that spans a wide geographical area and is used to connect WANs. • A WAN is normally a low-speed network and may include portions from different Internet Service Providers (ISPs) • LANs often connect machines in the factory plant. • WAN devices have evolved to create Low PowerWide Area Networks (LPWAN) for use in the IOT
  • 6. Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network The Role of the Network (Cont.)  Network Devices and Communication Media • Network devices are devices that connect to each other through a network. • An end device is either the source or destination of a message transmitted over the network. • Intermediary devices connect the individual end devices to the network and can connect multiple individual networks to form an internetwork. • Network addresses are used to uniquely identify devices on a network. • Network media provide the physical channel over which the message travels from source to destination.
  • 7. Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network The Role of the Network (Cont.)  Network Protocols • Devices must conform to common protocols before they can communicate. • Two very important network protocols are Ethernet and IP. • Ethernet rules enable communication between local devices. • IP enable communication between remote devices.  Basic Routing • Network packets must often transverse several networks to get to the destination. • Routing is the process of directing a network packet to its destination. • Routers are intermediary network devices that perform routing.  LANs, WANs and the Internet • Single router designs are common in SOHO. • The single router connects SOHO devices to the Internet. • The single router is the default gateway for all SOHO devices.
  • 8. Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network The Role of the Network (Cont.)  IoT Protocols • IoT Devices are often embedded devices designed to work in sub-optimal conditions. • These devices require specialized protocols to function with low power and limited connectivity. • IoT devices use CoAP (Constrained Application Protocol) and MQTT (Message Queuing Telemetry Transport).  Securing the Network • IoT devices are integrated into all aspects of daily life. • IoT applications carry traceable signatures and carry confidential data. • IoT devices must adhere to a secure framework (Authentication, Authorization, Network Enforced Policy, Secure Analytics)
  • 9. Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network 4.1.2 Wireless Technologies  WiFi • Wireless connectivity is the biggest growth area. • New protocols created/updated to support diverse IoT devices: ZigBee, Bluetooth, 4G/5G, LoRaWAN • Protocols created for short, medium, and wide ranges • Low-Power Wide-Area Networks (LPWAN) is designed to support long range communications for low bit rate devices such as sensors, actuators, and controllers
  • 10. Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network Wireless Technologies (cont’d)  ZibBee • A low-energy, low-power, low-data rate wireless protocol specification used to create personal area networks • Areas of utilization: home automation, medical device data collection, and other low- power low-bandwidth needs • 250 kbps transfer rate best suited for intermittent data transmissions • Every ZigBee data request uses an Application Profile Identification Number. • Application profile ID numbers - 16-bit numbers that relate to public profiles, manufacturing profiles, or private profiles. • ZigBee version 1.2 has a number of serious and exploitable security vulnerabilities. Most of these protocol design flaws relate to attempts to make it easier for the end-user to add a ZigBee device to the ZigBee network.
  • 11. Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network Wireless Technologies (cont’d)  Bluetooth • Wireless protocol used for data communication over short distances (PAN) • Supported by almost all mobile devices and accessories - the defacto standard for audio between mobile devices. • Bluetooth Low Energy (BLE) - very popular because of the smartphone industry and new applications in healthcare, fitness, and beacons. o operates in the 2.4 GHz ISM band o Has a very fast connection rate (milliseconds) and a very high data rate (1 Mbps). o The BLE device then goes into “sleep mode” until a connection is reestablished - lengthens the battery life for several years. • Beacons use BLE technology - positioned on buildings, in coffee shops, and on light posts to provide location services.
  • 12. Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network Wireless Technologies (cont’d)  4G/5G • Cellular-based data networks designed to take advantage of communications over large geographic areas • High mobility bandwidth (trains and cars) of 4G system is 100 Mbps • Low mobility (pedestrians and stationary users) of 4G systems is 1 Gbps • 4G provides support for voice, IP telephony, mobile Internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3D TV. • Long Term Evolution (LTE) and WiMAX (IEEE 802.16e) are two popular 4G systems. • LTE 4G technology release 13e includes the standardization of NarrowBand IoT (NB-IoT) - an LPWAN technology. • Next Generation Mobile Networks Alliance defining the standards and requirements for 5G
  • 13. Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network Wireless Technologies (cont’d)  LoRaWAN • Wireless technology designed to provide wireless WAN connections to power constricted devices. • targets key requirements of the Internet of Things such as secure bi- directional communication, mobility and localization services. • Architecture is often an extended star topology in which gateways relay messages between end-devices and a central network server is located in the backend. • Data rates range from 0.3 kbps to 50 kbps • Security is built into the LoRaWAN standard, implemented in a multi-layer encryption scheme. o Unique keys are used in the Application, Network, and Device layers.
  • 14. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 26 4.2 Fog and Cloud Computing
  • 15. Presentation_ID 27 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network 4.2.1 Fog and Cloud Services  Cloud Computing Model • On-demand access to a shared pool of configurable computing resources. • Resources can be made available quickly with minimal management effort. • Cloud service providers use data centers for their cloud services and cloud-based resources. • “Pay-as-you-go” model treats computing and storage expenses as a utility. • Enables access to organizational data and applications anywhere and at any time • Reduces cost for equipment, energy, physical plant requirements, and personnel training needs • Cloud services offered: Infrastructure as a Service (IaaS), Platform and mobile Platform as a Service (PaaS) (mPaaS), Software as a Service (SaaS)
  • 16. Presentation_ID 28 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network Fog and Cloud Services (cont’d)  Cloud Services • Cloud customers have access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. • Extends functionality of an IoT system: data processing and storage done in the cloud instead of in the IoT devices. • Data and resources - always available to any device in the system as long as the device has Internet connectivity • Cloud service providers are also very serious about security, ensuring customer data is kept safe and secure.. • Examples of cloud services: Amazon AWS, IFTTT, Zapier, Built.io, Webex Teams
  • 17. Presentation_ID 29 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network Fog and Cloud Services (cont’d)
  • 18. Presentation_ID 30 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network Fog and Cloud Services (cont’d)  Fog Computing Model • Distributed computing infrastructure closer to the network edge. • Edge devices run applications locally and make immediate decisions • Reduces the data burden on networks as raw data not sent over network connections. • Enhances security - keeping sensitive data from being transported beyond the edge where it is needed. • Fog applications monitor or analyze real-time data from network-connected things and then take action such as locking a door, changing equipment settings, applying the brakes on a train, zooming in with a video camera, • The action can involve machine-to-machine (M2M) communications and machine-to-people (M2P) interaction • Cisco predicts that 40% of IoT-created data will be processed in the fog by 2018
  • 19. Presentation_ID 31 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network 4.2.2 Big Data (cont’d)  Data Growth • Number of sensors and other IoT end devices growing exponentially and collecting a constant stream of data. • Consumer behavior is changing requires anytime, anywhere, on- demand access.- fitness monitors, smartphones, medical devices • Smart cities and smart grids, connected trains, cars – growing in frequency • Problems arise in terms of the requirements for storage, analysis, and security
  • 20. Presentation_ID 32 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network 4.2.2 Big Data (cont’d)  It is All About the Data • Big data is data that is so vast and complex it is difficult to store, process, and analyze using traditional data storage and analytics applications. • Typically characterized in three dimensions: volume, velocity, and variety o Volume - the amount of data being transported and stored o Velocity - the rate at which this data is generated o Variety - the type of data, which is rarely in a state that is perfectly ready for processing and analysis • Apache Hadoop, Webex Teams, Cassandra, and Kafka – examples of open source projects dealing with Big Data
  • 21. Presentation_ID 33 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network 4.2.3 Security Concerns in the IoT  Data Storage • IoT devices may store data for a period of time before sending it out for processing. – especially for devices that do not maintain constant connections to their gateways or controllers. • Critical that all IoT storage devices encrypt data for storage to avoid data tampering or theft • Self-encrypting drives have encryption capability built into the drive controller - encryption and decryption done by the drive itself, independent of the operating system. • Self-encrypting flash memory – manufacturers beginning to release new devices with self-encrypting flash memory
  • 22. Presentation_ID 34 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connecting Things to the Network 4.2.3 Security Concerns in the IoT (cont’d)  Data Transmission • If data is not properly secured through encryption, it can be intercepted, captured or manipulated while in transit. • Modern encryption algorithms may require more processing power than what is available in the IoT device. • As well as physical security, IoT devices must be able to protect its own firmware and the data it transmits. • Ensure that IoT devices are running the latest version of their firmware and protocols. • Common attack: trick devices into using sub-optimal security parameters under which the connection can be exploited • Servers, cloud endpoints, intermediary devices should also be secured and use strong encryption algorithms before communicating with IoT devices.
  • 23. © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 35 4.3 Chapter Summary
  • 24. Presentation_ID 36 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Personal information related to health, location, wealth, personal preferences and behaviors is passing through the IoT devices in increasing volumes. This increase in volume elevates the relevance of increasing the attention on data privacy and data protection.  New wireless technologies and protocols, such as ZigBee, Bluetooth, 4G/4G, and LoRaWAN, have been developed to accommodate the diversity of IoT devices. Wireless technology is selected based on the range of coverage, bandwidth requirements, power consumption, and deployment location.  Wireless security considerations include: selecting a secure protocol, protection for management frames, identification of frequency jamming, detecting rogue access points, and using security at the application layer.  Cloud computing is a service that offers off-premise, on-demand access to a shared pool of configurable computing resources. Cloud computing offers services such as IaaS, PaaS, mPaaS and SaaS.  A fog computing model identifies a distributed computing infrastructure closer to the network edge. It enables edge devices to run applications locally and make immediate decisions.  The proliferation of devices in the IoT is one of the primary reasons for the exponential growth in data generation. Data can be deemed at rest or in motion. Big Data is typically characterized in three dimensions: volume, velocity, and variety.  Data stored in servers must be encrypted to avoid data tampering or theft. Regular backups are mandatory to minimize losses in case of a disaster  IoT devices should run the latest version of firmware and protocols and any communication between devices should be done using protocols that provide secure encryption by default. Chapter Summary Summary
  • 25. Presentation_ID 37 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 26. Presentation_ID 38 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential