Unit-7: Iot Security
Unit-7: Iot Security
GTU # 3160716
Unit-7
IoT Security
Software
protect it even while updating patch.
Massage channels during the paring stage need
to protect in the public networking, like
OS/Firmware
Wi-Fi, Zigbee
Bluetooth
NFC
An appropriate protocol should be followed while
connecting the user and device.
An authentication process is needed when the
controller linking to a port in local network. Multidimensional Prospective of IoT Security
Software
cloud services are used for
authentication. multidimensional
Big data analytics on the data collected
are processed on cloud so cloud OS/Firmware
security is essential.
Abnormal behavior should be
monitored like too many login attempts
Network Security
Authentication
Management
Support Layer Cloud and Smart Computing
Privacy
Undeniability Internet Portable
IoT will be needed extra Network Layer Communication Network and
Communication Protocols
care for advanced
security and privacy Perceptual Layer RFID Reader, Sensors and GPS
across critical areas.
Application Layer
A dependable platform for the application
layer.
Grid and cloud computing are mostly used for
all kinds of intelligent computing powers.
Support Layer
This layers helps merge the application layer
upward and the network layer downward.
Network Layer
Application Layer
This layer delivers the personalized services
based on the users’ need.
Perceptual Layer
It helps users access IoT through the interface
using personal computer, mobile equipment,
etc.
Encryption
Encryption play key role in the security, but many
devices cannot perform the complex encryption
and decryption quickly because of limited
resource.
Products with constrained resources are most
likely to attacks.
Reverse engineering of algorithm is possible on it.
Communication Channel
The communication channel needs to be secure as well
Encrypting messages before transfer is good but it is better to use
transport encryption and to adopt standards like TLS.