IOTS Unit 5
IOTS Unit 5
In terms of supporting IoT applications and IoT development, AWS IoT integrates well with
Amazon Lambda, Kinesis, S3, CloudWatch, DynamoDB, and a variety of other Amazon-provisioned
cloud services:
A variety of industries have begun to engage the Amazon IoT platform, including
healthcare. For example. Philips has partnered to make use of the AWS IoT services as the
engine for its HealthSuite Digital platform. This platform is designed to allow medical
service providers and patients to interact in transformative new ways using IoT healthcare
devices, traditional data sources, analytics, and reporting.
CSP IoT services such as AWS IoT offer the ability to preconfigure IoT devices and then
upload the configurations to the physical devices when they are ready to bring online. Once
operational, AWS IoT offers a virtual Thing Shadow that can maintain the state of your IoT
device even when offline. The configuration state is kept in a JSON document stored in the
cloud. Things can either update or get the Thing Shadow. AWS IoT publishes a JSON
document for each update and responds to each update and get request with status of
/accepted or /rejected.
From a security perspective, it is important that only authorized endpoints and applications
are able to publish to these topics. It is also imperative that the administrative console be
locked down sufficiently to keep unauthorized actors from gaining access to directly
configure IoT assets. To illustrate some of the AWS IoT data processing workflow, let's
explore an additional use case for a connected farm that leverages the data processing
capabilities of the AWS cloud.
In this use case, there are a number of endpoints that are injecting data into the AWS cloud.
Data enters AWS through a number of potential front doors:
• Kinesis
• Kinesis Firehose
• MQTT broker
Once inside AWS, the AWS IoT rules engine functions as the decision point to determine
where data should be routed and any additional actions to take on the data. In many
instances, data will be sent to a database. for example, S3 or DynamoDB. Redshift can also
be employed and should be used to preserve records over time, as well as for long-term
data storage.
Within the AWS IoT suite, one can take advantage of the integrated log management
features through CloudWatch. CloudWatch can be configured directly within AWS IoT to log
process events on messages flowing from devices to the AWS infrastructure. Message
logging can be set to errors, warnings, informational, or debug. Although debug provides
the most comprehensive messages, these also take
up additional storage space:
Amazon CloudTrail should also be leveraged for an AWS-based IoT deployment. CloudTrail
supports account-level AWS API calls to enable security analysis analytics, and compliance tracking.
There are many third-party log management systems, such as Splunk, AlertLogic, and SumoLogic
that integrate directly with CloudTrail.
Azure's group management service is provided through the device group API, while its device
management features, software versioning, and provisioning, and so on, are provided through its
device registry management API (https:// azure.microsoft.com/en-us/documentation/articles/iot-hub-
devguide/). Centralized authentication is provided using the existing Azure Active Directory
authentication framework.
The Azure IoT Hub supports IoT-related protocols such as MQTT, HTTP, and AMQP to enable
device-to-cloud and cloud-to-device communication. Given the inevitable variety of communication
standards, Azure provides cross-protocol fusion capabilities to developers via a generic IoT Hub
message format. The message format consists of a variety of system and application property fields.
If needed, device-to-cloud communications can leverage Azure's existing event hub APIs, but if per-
device authentication and access control are needed, the IoT Hub will support this.
Per-device authentication and access control in Azure are enabled through the use of IoT Hub
security tokens that map to each device's access policy and credentials. Token-based authentication
allows authentication to take place without transmitting sensitive security parameters across the wire.
Tokens are based upon a unique Azure-generated key that is generated using the accompanying
manufacturer or implementer-provided device ID.
To illustrate some of the Azure IoT data processing workflow, let's return to our connected farm IoT
system and examine the backend configuration within Azure. As with AWS, there are various entry
points into the cloud for connected devices. Data can be ingested into Azure through the API
gateway or through the IoT services, which support REST and MQTT. Data can then be sent to blob
storage or to DocumentDB. Also note that the Azure Content Delivery Network (CDN) is a good
tool for distribution of firmware updates to your IoT device inventory:
3. Cisco Fog Computing.
Cisco's IoT strategy for the cloud addresses the fact that the vast majority of IoT devices operate at
the network edge versus in a region close to centralized cloud processing. Hence, the term fog,
visible moisture at the ground (edge) versus central cloud (sky) represents Cisco's rebranding of the
well-known concept of edge computing. The sheer scale of the IoT, Cisco is betting, will require
much more powerful functional and security resources integrated into network and application stacks
at organizations' network edges. The benefits of keeping data and processing as edge-central a
possible include the following:
• Reduced latency: Many data-intensive edge applications for the IoT are real-time because they
involve vast amounts of sensor data, localized decision making, and response.
• Data and network efficiency: Data volumes that comprise the IoT are enormous and there are
many cases where porting the data makes no sense in terms of clogging networks just to move it
around for application and security treatment.
• Policies can be locally managed and controlled based on local edge conditions.
• Reliability, availability, and security at the IoT edge are improved based on local needs.
The preceding benefits are perhaps most tangible to the industrial IoT where central-only cloud
processing just won't do. Time-sensitive sensor streams, controllers, and actuators, monitoring and
reporting applications and voluminous datasets associated with the industrial IoT make Fog
Computing an appealing model.
Cisco's Fog Computing, though early in its lifecycle, is already implemented in the IOx
(https://developer.cisco.com/site/iox/technical-overview/), a middleware framework that sits between
hardware and applications running directly on edge equipment. The basic IOx architecture consists
of the following:
• Fog nodes: These represent the devices (for example, routers and switches) that comprise edge
networks and provide host resources to the Fog framework.
• Host OS: Sitting on Fog nodes is the Host OS that supports the following:
° Cisco Application Framework (CAF) for local application
management and control
° Applications (of many possible types)
° Network and middleware services
• Fog director: Connected to the CAF's northbound APIs, the Fog director provides the centralized
application management and repositories for apps running on all of Fog nodes. Administration via
the Fog director is accessed through the Fog portal. IoT Fog Computing development is supported by
Cisco DevNet Software Development Kits. IoT organizations can also make use of existing Cisco
cybersecurity solutions such as Cisco NetFlow, TrustSec, and identity services engine (ISE).
SDNs emerged as next-generation network management capabilities to simplify and reduce the
amount of work to reconfigure networks and manage policy-based routes. In other words, they were
created to make the network itself more programmable and dynamic, an absolute necessity for the
enormous scale and flexibility needed to manage our world's IoT traffic. SDN architectures function
by decoupling network control from the forwarding functions. They are comprised of SDN
controllers that
implement 1) a northbound API or bridge that connects to network applications, and 2) a Southbound
API that connects the network controllers to the fielded network devices that perform traffic
forwarding.
IoT architectures that leverage large cloud services already benefit from SDN. Large virtualization
systems that host management servers, brokers, gateways to the fielded IoT devices, and other IoT
architectural elements are built into Amazon, Google, and other cloud providers. Over time, we
expect to see much more finegrained capabilities emerge in the ability to create, adapt, and
dynamically customize one's own IoT network. SDNs are being used today by security vendors
tackling distributed denial of service (DDOS) challenges and enterprises should look to tailor their
implementations to support that functionality.
5. Privacy-Preserving Cryptography.
Privacy Preserving Cryptography is an essential approach in modern cryptographic research and
application that focuses on maintaining the confidentiality of data while allowing for meaningful
computations or data analysis. This concept has gained importance with the rise of data-driven
technologies, where data sharing and processing are pivotal but often come at the expense of privacy.
The fundamental goal of privacy-preserving cryptography is to ensure that sensitive data remains
protected, even while being used in various operations. This is crucial for maintaining trust and
compliance with privacy regulations.
Several advanced cryptographic techniques have been developed to achieve privacy preservation.
One prominent method is homomorphic encryption, which allows computations to be performed
directly on encrypted data without the need for decryption. This ensures that sensitive information
remains secure throughout the process and only the final result is revealed in decrypted form.
Another important approach is secure multi-party computation (SMPC), which enables different
parties to jointly compute a function over their inputs without revealing them to each other. This
technique is especially useful in scenarios where data privacy is paramount, such as collaborative
research or joint financial analysis.
The rise of the Internet of Things (IoT), cloud computing, and distributed ledger technologies has
amplified the need for privacy-preserving cryptography. In these environments, data often travels
through multiple, potentially untrusted nodes, which increases the risk of exposure. Privacy-
preserving cryptographic protocols ensure that data confidentiality is maintained during these
transfers, enhancing the security and integrity of applications in finance, healthcare, and
communication.
Machine learning models for IoT threat detection operate by learning from historical data that
represents both normal and malicious behavior. Techniques such as supervised learning can be
employed to train models using labeled datasets that include examples of known attacks and
legitimate activity. This helps the model learn to differentiate between normal behavior and potential
threats. Unsupervised learning methods, such as clustering and anomaly detection, are also vital, as
they can identify previously unseen threats without prior labeling. These methods analyze real-time
data streams from IoT devices and look for deviations from established patterns, flagging them as
potential indicators of compromise.
Deep learning approaches, which use neural networks capable of learning hierarchical
representations of data, are particularly effective in handling complex and high-dimensional IoT
data. For instance, convolutional neural networks (CNNs) and recurrent neural networks
(RNNs) can be applied to process time-series data and network traffic patterns, identifying subtle
signs of sophisticated attacks like distributed denial-of-service (DDoS) and advanced persistent
threats (APTs). Additionally, reinforcement learning models are being explored to develop
adaptive threat detection systems that improve their performance over time based on feedback from
their environment.
The advantages of applying machine learning for IoT threat detection are significant. First, ML
models can process and analyze massive datasets in real-time, allowing for the quick identification of
threats and reduced response times. This is crucial in IoT environments where attacks can propagate
rapidly. Second, machine learning algorithms can continuously learn and adapt to new attack vectors,
providing robust defense mechanisms that keep pace with evolving cybersecurity threats. Third,
automation facilitated by machine learning reduces the reliance on manual intervention and helps in
managing large-scale IoT deployments without sacrificing security.
However, there are challenges associated with the use of machine learning in IoT threat detection.
The quality of the detection heavily depends on the quality and quantity of data available for training
the models. IoT networks often generate heterogeneous data, which can complicate the creation of
consistent and comprehensive datasets. Additionally, the computational limitations of many IoT
devices mean that resource-efficient ML algorithms must be developed to balance security with
performance constraints.
Despite these challenges, machine learning-based threat detection systems have proven to be
highly effective and are becoming a core component of modern IoT security strategies. Integrating
ML into IoT security helps organizations preemptively identify vulnerabilities and respond to
potential threats before they escalate, ensuring the reliability and safety of interconnected systems in
various sectors.
9. Firmware/Software Updates.
Firmware/Software Updates are critical for the continued security, performance, and functionality of
IoT (Internet of Things) devices and other connected systems. Firmware, the low-level software that
directly controls hardware components, and higher-level application software need periodic updates
to address vulnerabilities, fix bugs, and introduce new features or optimizations. Ensuring that
devices receive timely and secure updates is essential for maintaining system integrity and user trust.