THEORY
THEORY
Characteristics and
Applications
Contents
WHAT IS INTERNET OF BENEFITS AND
THINGS CHALLENGES OF IOT
Network communication
Real-time capability
Characteristics
Content-Awareness
IoT Service Characteristics Location-Awareness
Time-Awareness
Compatibility
Discoverability
Modularity
IoT Component Characteristics
Network connectivity
Shareability
Unique identification
Heterogenous
Interoperability
Other Characteristics
Legacy support
Compatibility
Well defined components
Flexibility
Usability
Manageability
Accuracy
Robustness Reliability
Resilience
Availability
Confidentiality
Security
Integrity
Safety
Protection of Personally
Privacy
Identifiable Information
Benefits of IoT
Cayenne 4 2 Raspberry
Cloud Pi 3
• 40 General
Purpose Input
Output (GPIO) Pins
3
VNC Viewer
IoT Products in Market
Google Nest GreenIQ Controller Fitbit Bands
03 04
IETF
IoTivity Internet Engineering Task
02 05 Force
IEEE IIC
Institute of Electrical and 01 06 Industrial Internet
Electronics Engineers Consortium
THANK YOU
History and Architecture of IoT
Wearable computer with
History of eyeglass mounted display to
IoT aid in lip reading
First wearable computer inside a
shoe
Late 1990s
Mario Cardullo receives
Connected objects
1973
2004
to monitor number of configuring home lights &
bottles switches, home healthcare &
shipping monitoring
Coke Vending Machines Research in IoT
The Main Elements of the one M2M IoT Architecture
Four Layers of IoT Architecture
Application Layer
Network Layer
Sensing Layer
IoT Users
(Include Human, Devices/HMI)
Security and Privacy
Network
Management Service Interchange
System System System Peer
Systems
IoT Gateway
(local services and
data)
IoT Devices
(Include sensors, actuators, and tags)
•Data Analytics
•Streaming Analytics
End Device/Node/
Cloud
Sensors/ Hardware
Transport Layer
TCP/UDP UDP (Provide the communication services
directly to the application)
6LoWPAN UDP
IEEE 802.15.4 MAC • Unreliable, connectionless and lighter protocol
IEEE 802.15.4 PHY
IoT: IEEE Standardized Protocol Stack
Internet Stack IoT Stack
Application Layer
HTTP CoAP (Data formatting and
presentation for web transfer)
Transport Layer
TCP/UDP UDP (Provide the communication services
directly to the application)
UDP
• CoAP is a specialized web transfer protocol in
IPv6/RPL IoT with smaller header sizes compared to HTTP.
6LoWPAN
IEEE 802.15.4 MAC
W Wireless
P Personal
6LoWPAN was developed by the IETF in 2007 to work on
specifications for transmitting IPv6 over IEEE 802.15.4 networks
and is now an open standard defined in RFC 6282
A Area
N Network
MTU - Maximum Transmission Unit
1280
IPv4 IPv6
Ethernet, Wi-Fi
IEEE 802.15.4
Frame Length
127 bytes
Extremely large for IEEE 802.15.4 link layer
IEEE 802.15.4 networks
Limited Buffering
IEEE 802.15.4 Frame (127 Bytes) ≈ 1/10th IPv6 minimum MTU (1280 Bytes)
Requires the network layer to be adaptive and responsive at the same time
low power and efficient
6LoWPAN Overview
IPv6 Datagram
IPv6 Dispatch IPv6 Header Payload COMPRESSION
• 6LoWPAN compresses the IPv6 header to reduce the
6LoWPAN Header
packet size by assuming the usage of common fields
Compression
Compressed IPv6 Datagram
FRAGMENTATION
IPHC Dispatch IPHC Header Payload
• 6LoWPAN fragments the IPv6 packet and sends it
through multiple smaller size packets that can fit in an
6LoWPAN
802.15.4 frame.
Fragmentation
• On the other end, it reassembles the fragmented packets
Compressed and Fragmented IPv6 Datagram to re-create the IPv6 packet.
Fragment Header IPHC Dispatch IPHC Header Payload • For this purpose, an additional fragment header is used
to reassemble the packets in the correct sequence.
Reassembly • When data packets are re-assembled, the additional
header is removed and the packets are restored to their
IPHC Dispatch IPHC Header Payload initial IPv6 format.
6LoWPAN Network Architecture
Dr. Kamaldeep
What is Routing?
ROUTE-OVER
MESH-UNDER
P
used for route-over 6LoWPAN networks
Protocol for
RPL is defined by the IETF in RFC 6550
L Low-Power and
Lossy Networks
Main Features of RPL
Energy-Efficient Routing
01 Optimizes routing for low-power devices, reducing
energy consumption by carefully managing data
transmission and device wake-ups
Adaptive Topology
Topology accommodates the dynamic nature of IoT
networks, allowing devices to join or leave without
disrupting the overall connectivity
02
Mechanism to support
03 Multipoint-to-point traffic and point to-multipoint traffic
Need for a New Routing Protocol in IoT
LLN routers
1 Constraints on processing, memory, and energy
2
Couldn’t use conventional routing protocols like
OSPF, RIP, AODV, DSR, etc.
7 6
3 Interconnected by lossy links
Traffic patterns were not simply point-to-point, but
4 5
in many cases point-to-multipoint or even
multipoint-to-point
DAG root:
A DAG root is a node within the DAG that has no outgoing edge
Root Node
Sensor Node
Transmission/
Reception range
Routing Path
RPL Terminology (contd..)
Objective Function
Defines what metrics or constraints to use for finding
minimum cost paths in a given RPL instance like
minimize energy, latency etc.
RPL Terminology (contd..)
Sensor Node
Transmission/
Reception range
Routing Path
RPL Terminology (contd..)
DODAG Root
DODAG Root
RPL Instance
An RPL Instance may include one or more
DODAGs and a node may belong to
multiple RPL instances
RPL Instance
DODAG Root
DODAG Root
DODAG Version
1
It is the current version of the DODAG and
2
1 2
DODAG Version
DODAG Root
Nodes in sub-DODAG:
RPL Modes of Operation
1, 2, 3, 4, 5, 6
Nodes in sub-
DODAG: 3, 6 1 2 Nodes in sub-DODAG: 4, 5
Storing Mode
Data Data
Nodes in sub-
DODAG: 6 3 4 5 Nodes in sub-
Nodes in sub- DODAG: Nil
Nodes in sub- 6 DODAG: Nil Nodes keep routing tables for sub-DODAG
DODAG: Nil
Storing Mode
Node 4 → Node 2 → Node 5
Each node knows about nodes in sub-DODAG. Thus, Node 2 itself routes data from node 4 to node 5
Data
1
Data
2 Non-Storing Mode
Data Data
DODAG Root
DIO
1. DODAG Information Object (DIO)
DIO
1 2
DIO Carries information that allows a node to:
DIO DIO
DIO
• Discover a RPL instance
DIO 3 4 5
• Learn its configuration parameters
6
• Select a DODAG parent set
• Maintain the DODAG
DIO: Downward RPL instance multicasts
RPL Control Messages
(contd..)
DODAG Root
2. DODAG Information Solicitation DIO
(DIS)
DIO
1 2
DIO DIO
1 2
DAO
DIO
DAO
DAO DAO messages are used to propagate
destination information upward along the
DIO DIO
4 5
DODAG
3
DAO
DIO
DIS
DIS
6
• In storing mode, the DAO message is unicast by
DIS
7 the child to the selected parent (s).
New Node
• In non-storing mode, the DAO message is unicast
to the DODAG root.
RPL Control Messages
(contd..)
4. Destination Advertisement
DODAG Root
DAO DAO
DIO DIO
DAO
DIO
DIS
DIS
DIS
7
New Node
It is an IPv6 compliant distance vector routing protocol
R IPv6 Routing
An RPL instance consists of one or more DODAGs
CoAP is a specialized web transfer protocol for use with constrained nodes and networks in the IoT
It is designed and developed by the Constrained RESTful Environments i.e. CoRE working group of
the IETF specifically for machine-to-machine (M2M) and IoT applications like smart homes, building
automaton etc.
Evolution of CoAP: A Product of the CoRE Working Group
CoRE WG aimed at realizing the REST architecture in a suitable form for the constrained nodes and networks
Designed CoAP as an application layer protocol which is very similar to HTTP protocol of the conventional
Internet and follows the same request-response pattern used by HTTP
REST
Client
Client
Uses familiar HTTP terms like GET, PUT, POST, and DELETE Methods, status codes, URIs etc.
COAP is equivalent of HTTP REST for Constrained environments with low memory, low power, low
bandwidth, and higher rate of packet failure
CoAP aims to keep message overhead small, thus limiting the need for
01 Smaller Message fragmentation and minimizing the communication overhead
Overhead CoAP achieves this goal by using a minimal header size, compressing
HTTP and efficient message serialization, making it an ideal choice for
resource-constrained environments
02 CoAP does not blindly compress HTTP but rather realizes a subset of REST
Subset of REST common with HTTP to optimize it for IoT applications
CoAP easily translates to HTTP for integration with the existing Web
Core Design Principles of CoAP
CoAP
Message Layer
In charge of mapping requests to
Request/
responses and their interactions
Response using Method and Response Codes
Layer Transport - UDP
CoAP Methods
Methods indicate the type of interaction a client wants to have with a resource on the server
CoAP Server 1
(Thermostat in Living Room)
CoAP client
Requests the resource CoAP Server 2
(Thermostat in Bedroom)
Name of the
protocol
coap://myhome.in:5683/nest_livingroom/temp
CoAP Request Response Example
CoAP Server 1
(Thermostat in Living Room)
CoAP client
Requests the resource CoAP Server 2
(Thermostat in Bedroom)
Domain
coap://myhome.in:5683/nest_livingroom/temp
Security
and
Privacy Concerns In IoT
Unlock
Lock
Devices are collecting large amounts of data
that can capture your actions and location
throughout the day often we don't exactly know
all that is being collected or how this
information is being used
SECURITY ISSUES IN IoT
SECURITY ISSUES IN IoT
• As per reports of OWASP(Open Web application Security
Project), IoT Security is challenged by
– Constrained Resources
– Limited Computational Power
– Usage of insecure Operating System
– Insufficient Authentication and authorization
– Lack of Transport encryption etc.
12/29/2023 NITTTR CHANDIGARH 5
• Currently, there are over 23 billion IoT
1. Insufficient testing and connected devices worldwide. This number
updating will further rise up to reach 30 billion by 2020
2. Brute-forcing and the issue of and over 60 billion by the end of 2025.
default passwords • In fact, one of the main problems with tech
3. IoT malware and ransomware companies building these devices is that they
4. IoT botnets aiming at are too careless when it comes to handling of
cryptocurrency device-related security risks.
5. Data security and privacy concerns
(mobile, web, cloud) • Most of these devices and IoT products don’t
6. Small IoT attacks that evade get enough updates while, some don’t get
detection updates at all.
7. AI and automation • This means that a device that was once
8. Home Invasions thought of as secure when the customers first
9. Remote vehicle access bought it becomes insecure and eventually
10. Untrustworthy communication
prone to hackers and other security issues.
1. Insufficient testing and
updating • IoT manufacturers, however, are more eager to
2. Brute-forcing and the issue of produce and deliver their devices as fast as they
default passwords can, without giving security too much of a thought.
3. IoT malware and ransomware
4. IoT botnets aiming at • Unfortunately, most manufacturers offer firmware
cryptocurrency updates only for a short period of time, only to stop
5. Data security and privacy concerns the moment they start working on the next headline-
(mobile, web, cloud) grabbing gadget. Even worse, they use unsupported
6. Small IoT attacks that evade legacy Linux kernels
detection
7. AI and automation
8. Home Invasions
9. Remote vehicle access
10. Untrustworthy communication
1. Insufficient testing and updating
2. Brute-forcing and the
issue of default passwords
3. IoT malware and ransomware • The Mirai botnet, used in some of the largest
4. IoT botnets aiming at and most disruptive DDoS attacks is perhaps
cryptocurrency one of the best examples of the issues that
5. Data security and privacy concerns come with shipping devices with default
(mobile, web, cloud) passwords and not telling consumers to
6. Small IoT attacks that evade change them as soon as they receive them.
detection
7. AI and automation
8. Home Invasions
9. Remote vehicle access
10. Untrustworthy communication
1. Insufficient testing and
updating • There are some government reports that advise
2. Brute-forcing and the manufacturers against selling IoT devices that
issue of default come with default (read, hackable) credentials
passwords such as using “admin” as username and/or
3. IoT malware and ransomware passwords.
4. IoT botnets aiming at
cryptocurrency • These are nothing more than guidelines now,
5. Data security and privacy and there aren’t any legal repercussions to
concerns (mobile, web, cloud) incentivize manufacturers to abandon this
6. Small IoT attacks that evade dangerous practice.
detection
7. AI and automation • Weak credentials and login details leave nearly
8. Home Invasions
all IoT devices vulnerable to password hacking
9. Remote vehicle access
10. Untrustworthy communication and brute-forcing in particular.
1. Insufficient testing and updating
2. Brute-forcing and the
issue of default passwords • The only reason why Mirai malware was so
3. IoT malware and ransomware successful is that it identified vulnerable IoT devices
4. IoT botnets aiming at and used default usernames and passwords to log in
cryptocurrency and infect them.
5. Data security and privacy concerns
(mobile, web, cloud) • Therefore, any company that used factory default
6. Small IoT attacks that evade credentials on their devices is placing both their
detection business and its assets and the customers and their
7. AI and automation valuable information at risk of being susceptible to a
8. Home Invasions brute-force attack.
9. Remote vehicle access
10. Untrustworthy communication
1. Insufficient testing and updating
2. Brute-forcing and the issue of
default passwords
3. IoT malware and • As the number of IoT connected devices
ransomware continues to rise in the following years, so
4. IoT botnets aiming at will the number of malware and ransomware
cryptocurrency used to exploit them.
5. Data security and privacy concerns
(mobile, web, cloud)
6. Small IoT attacks that evade
detection
7. AI and automation
8. Home Invasions
9. Remote vehicle access
10. Untrustworthy communication
1. Insufficient testing and updating
• While the traditional ransomware relies on
2. Brute-forcing and the issue of
encryption to completely lock out users out of
default passwords
different devices and platforms, there’s an ongoing
3. IoT malware and hybridization of both malware and ransomware
ransomware strains that aims to merge the different types of
4. IoT botnets aiming at attack.
cryptocurrency
5. Data security and privacy concerns • The ransomware attacks could potentially focus on
(mobile, web, cloud) limiting and/or disabling device functionality and
6. Small IoT attacks that evade stealing user data at the same time.
detection
7. AI and automation • For example, a simple IP camera is ideal for
8. Home Invasions capturing sensitive information using a wide range
9. Remote vehicle access of locations, including your home, work office or
10. Untrustworthy communication even the local gas station.
1. Insufficient testing and updating
2. Brute-forcing and the issue of
default passwords • The webcam can then be locked and footage
3. IoT malware and funneled to an infected web address which
ransomware could extract sensitive data using the malware
4. IoT botnets aiming at access point and demand ransom to unlock
cryptocurrency the device and return the data.
5. Data security and privacy concerns
(mobile, web, cloud) • The ever-increasing number of IoT devices will
6. Small IoT attacks that evade
give birth to unpredictability in regards to
detection
future attack permutations.
7. AI and automation
8. Home Invasions
9. Remote vehicle access
10. Untrustworthy communication
1. Insufficient testing and updating
2. Brute-forcing and the issue of
default passwords
3. IoT malware and ransomware
4. IoT botnets aiming at
cryptocurrency
5. Data security and privacy concerns • The heated mining competition, coupled with
(mobile, web, cloud)
the recent rise of cryptocurrency valuations is
6. Small IoT attacks that evade
detection proving too enticing for hackers trying to cash
7. AI and automation in on the crypto-craze.
8. Home Invasions
9. Remote vehicle access
10. Untrustworthy communication
1. Insufficient testing and updating
2. Brute-forcing and the issue of • While most find blockchain resistant to hacking, the
default passwords number of attacks in the blockchain sectors seems
3. IoT malware and ransomware to be increasing.
4. IoT botnets aiming at
• The main vulnerability isn’t the blockchain itself, but
cryptocurrency rather the blockchain app development running on it.
5. Data security and privacy concerns
(mobile, web, cloud)
• Social engineering is already being used to extract
6. Small IoT attacks that evade
usernames, passwords, and the private keys and
detection
we’ll see it being used more often in the future to
7. AI and automation
hack blockchain-based apps.
8. Home Invasions
9. Remote vehicle access
10. Untrustworthy communication
1. Insufficient testing and updating
• The open-source cryptocurrency Monero is one of
2. Brute-forcing and the issue of
the many digital currencies currently being mined
default passwords
with IoT devices. Some of the hackers have even
3. IoT malware and ransomware
repurposed IP and video cameras to mine crypto.
4. IoT botnets aiming at
cryptocurrency • Blockchain breaches, IoT botnet miners and
5. Data security and privacy concerns manipulation of data integrity pose a huge risk for
(mobile, web, cloud) flooding the open crypto-market and disrupting
6. Small IoT attacks that evade already volatile value and structure of
detection cryptocurrencies.
7. AI and automation
8. Home Invasions • IoT applications, structures, and platforms relying on
9. Remote vehicle access blockchain technology need to become regulated
10. Untrustworthy communication and constantly monitored and updated if it were to
prevent any future cryptocurrency exploits.
1. Insufficient testing and updating
2. Brute-forcing and the issue of
default passwords
3. IoT malware and ransomware
4. IoT botnets aiming at
cryptocurrency
5. Data security and privacy
concerns (mobile, web, • Data privacy and security continues to be the
single largest issues in today’s interconnected
cloud) world.
6. Small IoT attacks that evade
detection
7. AI and automation
8. Home Invasions
9. Remote vehicle access
10. Untrustworthy communication
1. Insufficient testing and updating
2. Brute-forcing and the issue of
default passwords
3. IoT malware and ransomware • Data is constantly being harnessed, transmitted,
4. IoT botnets aiming at stored and processed by large companies using a
cryptocurrency wide array of IoT devices, such as smart TVs,
speakers and lighting systems, connected printers,
5. Data security and privacy HVAC systems, and smart thermostats.
concerns (mobile, web,
cloud) • Commonly, all this user-data is shared between or
6. Small IoT attacks that evade even sold to various companies, violating our rights
detection for privacy and data security and further driving
7. AI and automation public distrust.
8. Home Invasions
9. Remote vehicle access
10. Untrustworthy communication
1. Insufficient testing and updating
2. Brute-forcing and the issue of
default passwords • We need to set dedicated compliance and privacy
3. IoT malware and ransomware rules that redact and anonymize sensitive data
4. IoT botnets aiming at before storing and disassociating IoT data payloads
cryptocurrency from information that can be used to personally
5. Data security and privacy identify us.
concerns (mobile, web, • Cached and no longer needed data should then be
cloud) disposed of securely.
6. Small IoT attacks that evade
detection • If the data is stored, then the largest challenge is in
7. AI and automation compliance with various legal and regulatory
8. Home Invasions structures
9. Remote vehicle access
10. Untrustworthy communication
1. Insufficient testing and updating
2. Brute-forcing and the issue of
default passwords
3. IoT malware and ransomware
4. IoT botnets aiming at
cryptocurrency
5. Data security and privacy concerns
(mobile, web, cloud)
6. Small IoT attacks that • The largest IoT-based botnet two years ago
was the Mirai botnet. In 2017, it was the
evade detection Reaper, a significantly more dangerous botnet
7. AI and automation
than the famed Mirai.
8. Home Invasions
9. Remote vehicle access
10. Untrustworthy communication
1. Insufficient testing and updating
2. Brute-forcing and the issue of
default passwords • As important as large-scale attacks can be, what we
3. IoT malware and ransomware should be fearing in 2018 are the small-scale
4. IoT botnets aiming at attacks that evade out detection.
cryptocurrency
5. Data security and privacy concerns • We are guaranteed to see more and more micro-
(mobile, web, cloud) breaches slipping through the security net in the
6. Small IoT attacks that next couple of years.
evade detection • Instead of using the big guns, hackers will most
7. AI and automation likely be using subtle attack small enough to let the
8. Home Invasions information leak out instead of just grabbing
9. Remote vehicle access millions and millions of records at once.
10. Untrustworthy communication
1. Insufficient testing and updating
2. Brute-forcing and the issue of
default passwords
3. IoT malware and ransomware
4. IoT botnets aiming at
cryptocurrency
5. Data security and privacy concerns
(mobile, web, cloud)
6. Small IoT attacks that evade • As IoT devices continue to invade our
detection
everyday lives, enterprises will eventually have
7. AI and automation to deal with hundreds of thousands, if not
8. Home Invasions millions of IoT devices.
9. Remote vehicle access
10. Untrustworthy communication
• This amount of user-data can be quite difficult to
1. Insufficient testing and updating
manage from a data collection and networking
2. Brute-forcing and the issue of
perspective.
default passwords
3. IoT malware and ransomware
• AI tools and automation are already being used to
4. IoT botnets aiming at
sift through massive amounts of data and could one
cryptocurrency
day help IoT administrators and network security
5. Data security and privacy concerns
officers enforce data-specific rules and detect
(mobile, web, cloud)
anomalous data and traffic patterns.
6. Small IoT attacks that evade
detection
• However, using autonomous systems to make
7. AI and automation autonomous decisions that affect millions of
8. Home Invasions functions across large infrastructures such as
9. Remote vehicle access healthcare, power and transportation might be too
10. Untrustworthy communication risky, especially once you consider that it only takes
a single error in the code or a misbehaving
algorithm to bring down the entire infrastructure.
1. Insufficient testing and updating
2. Brute-forcing and the issue of • These are just some of the most pressing IoT
default passwords security challenges we need to consider while we
3. IoT malware and ransomware build an app based on IoT in the following years.
4. IoT botnets aiming at
cryptocurrency • As you can see, most of them revolve around two
5. Data security and privacy concerns things, keeping IoT secure against attacks and
(mobile, web, cloud) keeping the user-data secure against theft.
6. Small IoT attacks that evade
detection • Both of these challenges can be resolved with strict
7. AI and automation legal and regulatory frameworks aimed at
8. Home Invasions manufacturers, with large fines and working
9. Remote vehicle access constriction used for those who do not follow said
10. Untrustworthy communication frameworks.
• Perhaps one of the scariest threats that IoT can
1. Insufficient testing and updating possess is of the home invasion. Nowadays, IoT
2. Brute-forcing and the issue of devices are used in a large number at homes and
default passwords offices which has given rise to the home
3. IoT malware and ransomware automation.
4. IoT botnets aiming at
cryptocurrency • The security of these IoT devices is a huge matter of
5. Data security and privacy concerns concern as it can expose your IP address that can
(mobile, web, cloud) pinpoint to your residential address.
6. Small IoT attacks that evade
detection • This vital information can be sold by the hackers to
7. AI and automation the underground websites which are havens for
criminal outfits.
8. Home Invasions
9. Remote vehicle access • Moreover, if you’re using IoT devices in your
10. Untrustworthy communication security systems, then there is a possibility that
they might compromise as well as leave your house
at a huge potential threat.
1. Insufficient testing and updating
2. Brute-forcing and the issue of
default passwords
3. IoT malware and ransomware
4. IoT botnets aiming at
cryptocurrency
5. Data security and privacy concerns
(mobile, web, cloud)
6. Small IoT attacks that evade
detection • Apart from home invasion, hijack of your car is
7. AI and automation also one of the threat possessed by the IoT.
8. Home Invasions
9. Remote vehicle access
10. Untrustworthy communication
1. Insufficient testing and updating
2. Brute-forcing and the issue of
default passwords
• Smart cars are on the verge of becoming reality with
3. IoT malware and ransomware
the help of connected IoT devices. However, due its
4. IoT botnets aiming at
IoT association, it also possesses a greater risk of a
cryptocurrency
car hijack.
5. Data security and privacy concerns
(mobile, web, cloud)
• A skilled hacker might hijack by getting the access
6. Small IoT attacks that evade
of your smart car through the remote access. This
detection
will be scary situation as anyone can have control
7. AI and automation
over your car and it can leave you vulnerable to
8. Home Invasions
lethal crimes.
9. Remote vehicle access
10. Untrustworthy communication
• There are many IoT devices which send messages
1. Insufficient testing and updating
to the network without any encryption. This is one
2. Brute-forcing and the issue of
of the biggest IoT security challenge which exists
default passwords
out there.
3. IoT malware and ransomware
4. IoT botnets aiming at
• It’s high time that all the companies ensure
cryptocurrency
encryption of the highest level among their cloud
5. Data security and privacy concerns
services and devices.
(mobile, web, cloud)
6. Small IoT attacks that evade
• To avoid this threat, the best way to do is to use
detection
transport encryption and standards like TLS.
7. AI and automation
Another way is to use different networks that
8. Home Invasions
isolates different devices.
9. Remote vehicle access
10. Untrustworthy • You can also use private communication which
communication ensures that the data transmitted is secure and
confidential.
1. Insufficient testing and updating • However, lack of basic security awareness among
2. Brute-forcing and the issue of staff as well as state-of-the-art cybersecurity
default passwords solutions has made the healthcare industry a
3. IoT malware and ransomware favourite target for hackers.
4. IoT botnets aiming at
cryptocurrency • A 2016 report from cybersecurity firm
5. Data security and privacy concerns SecurityScorecard found that healthcare is the fifth
(mobile, web, cloud) highest in ransomware counts among all industries,
6. Small IoT attacks that evade and more than 77 per cent of the entire healthcare
detection industry has been infected with malware since
7. AI and automation August 2015.
8. Home Invasions
9. Remote vehicle access • Among them was the notorious WannaCry
10. Untrustworthy ransomware attack in 2016 which affected over
300,000 machines across 150,000 countries,
communication including the UK's National Health Service (NHS).
Effective Ways to build security in IoT Apps
01
Automatic Application Scanning
02
Implement Already Vetted Architectures
03
Always Encrypt Sensitive Data
• They provide instant feedback to the developer about
the security vulnerabilities that might be introduced
Automatic into the app due to a certain line of code they’re
writing.
Application • Implementing these tools from the start of the
Scanning development cycle means security testing isn’t left for
the end of the development phase; it becomes an
iterative process.
• However, these tools should be seen more as aids,
than as solutions because there’re many security
vulnerabilities they are not equipped to identify.
• Some popular source code analysis tools include
OWASP SWAAT Project, IBM Security AppScan
Source, VeraCode etc.
12/29/2023 NITTTR CHANDIGARH 31
Implement • If you’re aiming to build a complete mobile
solution, then it’ll need to access real time data
Already Vetted on-the-go and perform different transactions.
• This will require strong and safe integration to
Architectures the cloud and other onsite systems. In short,
you’ll need to make sure your server-side
controls are fool-proof and efficient.
• So, how can you ensure the security of these
gateways? By using and implementing 3rd party
architecture (middleware) that have perfected
their art, instead of building your own custom
mobile gateways.
12/29/2023 NITTTR CHANDIGARH 32
• Turning your sensitive data into an unreadable,
Always Encrypt protected, format seems like a no-brainer, but sadly as
highlighted by NowSecure in its report, 35% of all
mobile applications don’t encrypt the sensitive data
Sensitive Data they send over the network.
Sensor takes input from environment and senses surroundings Actuator takes input from output
3
condition. signal conditioning unit of system.
It gives information to the system about environment condition It accepts command from system to
5
to monitor and control. deliver physical action.
Different Types of Sensors
•Temperature Sensor
•Proximity Sensor
•Accelerometer
•IR Sensor (Infrared Sensor)
•Pressure Sensor
•Light Sensor
•Ultrasonic Sensor
•Smoke, Gas and Alcohol Sensor
•Touch Sensor
•Color Sensor
•Humidity Sensor
•Position Sensor
•Magnetic Sensor (Hall Effect Sensor)
•Microphone (Sound Sensor)
Different Types of Sensors
Different Types of Actuators
Thank you