Iot Ut - 2
Iot Ut - 2
Iot Ut - 2
4) Zigbee Architecture
ZigBee is an open, global, packet-based protocol designed to provide an easy-
to-use architecture for secure, reliable, low power wireless networks. ZigBee
is a standard that addresses the need for very low-cost implementation of
Low power devices with Low data rates for short-range wireless
communications.
ZigBee Devices:
Zigbee Coordinator Device: It communicates with routers. This device is
used for connecting the devices.
Zigbee Router: It is used for passing the data between devices.
Zigbee End Device: It is the device that is going to be controlled.
4. Efficiency:
IoT devices often operate on limited power and processing
resources. Standardized protocols should be designed with
efficiency in mind to minimize data transmission overhead,
conserve energy, and optimize network utilization.
Efficient protocols help extend the battery life of IoT devices and
reduce the cost of data transmission.
5. Cross-Industry Collaboration:
Protocol standardization often involves collaboration among
industry groups, standards bodies, and consortia. For example,
the development of IoT standards may include contributions
from organizations like the Industrial Internet Consortium (IIC),
the IoT Consortium, and the Open Connectivity Foundation
(OCF).
Cross-industry collaboration helps ensure that IoT standards are
applicable to a wide range of use cases and industries.
6. Evolvability:
IoT is a rapidly evolving field. Protocol standardization efforts
should allow for updates and revisions to accommodate
emerging technologies and changing requirements.
Standardization bodies may establish mechanisms for updating
protocols to keep pace with industry advancements.
7. Education and Adoption:
Once standards are defined, industry organizations and
governments play a role in promoting awareness, education, and
adoption of these standards. This includes encouraging
manufacturers to build compliant devices and helping
organizations implement them effectively.
UNIT – 2
1)Explain layered attacker’s model with architecture.
A layered attacker's model for IoT (Internet of Things) involves considering
security threats and potential attackers at multiple levels within an IoT
system, from the physical layer to the network layer to the application layer.
Here's a detailed explanation of the layered attacker's model for each of
these layers in IoT:
1. Physical Layer:
Attacker's Focus: Physical attacks at this layer typically involve attempts
to physically manipulate or compromise IoT devices, sensors, or
equipment. Attackers may try to gain physical access to devices or
interfere with the hardware directly.
Threats and Vulnerabilities:
Tampering: Attackers may open IoT device enclosures to gain
access to internal components and tamper with hardware or
firmware.
Device Theft: The theft of devices could lead to data exposure
and misuse.
Eavesdropping: Attackers may attempt to eavesdrop on
communication between devices or intercept data through
physical means.
Security Measures:
Physical Security: Implement physical security measures to
protect IoT devices from unauthorized access or tampering,
including locks, enclosures, and tamper-evident seals.
Secure Boot: Enable secure boot processes to ensure that only
authenticated and unaltered firmware can run on devices.
Device Tracking: Use mechanisms like device tracking and
geolocation to prevent or recover from device theft.
2. Network Layer:
Attacker's Focus: At the network layer, attackers aim to exploit
vulnerabilities in network communication, potentially compromising
data integrity and confidentiality or disrupting communication.
Threats and Vulnerabilities:
Unauthorized Access: Attackers may attempt to infiltrate the
network by exploiting weak authentication, access control, or
unpatched vulnerabilities.
Data Interception: Intercepting and eavesdropping on data in
transit is a common attack, compromising data confidentiality.
Denial of Service (DoS): Attackers may flood the network with
traffic to disrupt services or render IoT devices inoperative.
Security Measures:
Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS):
Deploy these security measures to protect against unauthorized
access and detect suspicious network activity.
Encryption: Use end-to-end encryption to secure data in transit
and prevent data interception.
Access Control: Implement robust access control mechanisms to
restrict network access to authorized entities.
3. Application Layer:
Attacker's Focus: At the application layer, attackers aim to exploit
vulnerabilities in IoT applications, services, and user interfaces,
potentially compromising data integrity, availability, and user privacy.
Threats and Vulnerabilities:
Injection Attacks: Attackers may inject malicious code or
commands through user inputs or data feeds.
Data Manipulation: Unauthorized users may manipulate data,
leading to incorrect actions or responses from the IoT system.
Access Control Bypass: Attackers might attempt to bypass access
control mechanisms to gain unauthorized access to sensitive
functions or data.
Security Measures:
Secure Coding Practices: Follow secure coding practices to
prevent injection attacks and other application-layer
vulnerabilities.
User Authentication: Implement strong user authentication and
authorization to restrict access to authorized users.
Data Validation: Validate and sanitize data inputs to prevent
injection and data manipulation attacks.
Security Testing: Regularly conduct security testing, including
penetration testing and code reviews, to identify and address
application-level vulnerabilities.
7. Mitigation Strategies:
Security Controls: Develop a list of security controls and
countermeasures to mitigate each high-priority threat. These
controls may include authentication, encryption, access control,
intrusion detection, and security patch management.
Defense-in-Depth: Implement a defense-in-depth strategy, where
multiple security measures are layered to protect against a
variety of threats.
Secure Design Practices: Incorporate secure design practices from
the beginning of the IoT system development, including secure
boot, secure firmware updates, and secure communication
protocols.
Security Testing: Plan for security testing, including vulnerability
scanning, penetration testing, and code reviews to identify and
address vulnerabilities.
8. Documentation and Reporting:
Document the threat modeling process, including the identified
threats, their associated risks, and the recommended mitigation
strategies. This documentation is essential for reference,
communication, and accountability.
9. Iterative Process:
Threat modeling is not a one-time activity. As the IoT system
evolves and new threats emerge, the threat model should be
reviewed and updated periodically to ensure ongoing security.
10.Education and Training:
Ensure that the development and operations teams are trained
in security best practices and understand the threat model. This
knowledge empowers them to implement security controls
effectively.
Uses of DTLS
DTLS is used in applications such as live video feeds, video streaming, gaming,
VoIP, and instant messaging where loss of data is comparatively less
important than latency.
4.6LoWPAN
6LoWPAN (IPv6 over Low Power Wireless Personal Area Networks) is a
protocol for low-power networks like IoT systems and wireless sensor
networks.
Features of 6LoWPAN
•6LoWPAN is used to carry data packets in the form of IPv6 over various
networks.
•provides end-to-end IPv6 and hence provides direct connectivity to a wide
variety of networks including direct connectivity to the Internet.
•6LoWPAN is used for protecting the communications from the end-users to
the sensor network.
Uses of 6LoWPAN
6LoWPAN plays a key role in domains like smart home automation, industrial
monitoring, smart grids, general automation, etc.
5. ZigBee
ZigBee is believed to be a state-of-the-art protocol to provide security for
internet of things devices and applications. It provides efficient machine-to-
machine communication from 10–100 meters away in low-powered
embedded devices like radio systems. It is a cost effective open-source
wireless technology.
ZigBee supports two security models:
The Centralized Security Network
The Distributed Security Network
Features/Advantages of IoT with ZigBee
•ZigBee provides standardization at all layers, which enables compatibility
between products from different manufacturers.
•Due to its mesh architecture, devices tend to connect with every device in
the vicinity. This helps in expanding the network and making it more flexible.
•ZigBee uses “Green Power” that facilitates lower energy consumption and
cost.
•ZigBee helps in the scalability of networks as it supports a high number
(about 6,550) of devices.
UNIT – 3
1) Explain different IOT development boards with features
Arduino Boards:
Arduino is a well-known open-source platform for IoT and embedded
system development.
Key Features:
Various models, including the Arduino Uno, Arduino Nano, and
Arduino Mega, suitable for different applications.
User-friendly development environment with an integrated
development environment (IDE).
A wide range of shields (add-on modules) and libraries to extend
functionality.
Capable of reading sensors, controlling actuators, and connecting
to the internet.
Community support and extensive online resources for
beginners.
Raspberry Pi Boards:
Raspberry Pi is a versatile single-board computer for IoT, robotics, and
general-purpose computing.
Key Features:
Powerful processors (e.g., Raspberry Pi 4) with multiple cores
and generous RAM.
Running a full-fledged operating system (e.g., Raspberry Pi OS,
based on Linux).
HDMI output for displays and USB ports for peripherals.
GPIO (General Purpose Input/Output) pins for hardware
interfacing.
Extensive community and third-party software support.
NodeMCU Boards:
NodeMCU is based on the ESP8266 module and is specifically designed
for IoT and Wi-Fi connectivity.
Key Features:
Built-in Wi-Fi connectivity with an ESP8266 microcontroller.
Lua-based firmware, simplifying IoT application development.
GPIO pins for sensor and actuator connections.
Ideal for IoT projects involving cloud connectivity.
ESP32/ESP8266 Boards:
ESP32 and ESP8266 are low-cost, low-power Wi-Fi and Bluetooth
modules for IoT development.
Key Features:
Wi-Fi and Bluetooth connectivity.
Dual-core processors (ESP32) or single-core (ESP8266).
GPIO pins for hardware interfacing.
Arduino IDE support and extensive libraries.
Suitable for low-power, battery-operated IoT devices.
BeagleBone Boards:
BeagleBone is a family of single-board computers for IoT, robotics, and
industrial applications.
Key Features:
Different models, such as the BeagleBone Black and BeagleBone
AI.
High-performance processors, with various interfaces like USB,
Ethernet, HDMI, and GPIO pins.
Capable of running various Linux distributions.
Suitable for more complex IoT applications and robotics projects.
Intel Galileo:
Intel Galileo was an IoT development board based on the Intel Quark
X1000 SoC (System-on-Chip).
Key Features (Note: Intel has discontinued the Galileo platform):
x86 architecture, making it capable of running Windows or Linux.
GPIO pins for hardware interfacing.
Onboard Ethernet and USB ports.
Integration with Intel's IoT development tools.