Chapter 8
Chapter 8
Internet of Things
Security and Privacy
26 October 2015
Chapter 8
understand the communications that were exchanged prior to joining the network.
Mapping of IoT Domains
IoT Applications
IoT Cloud Domain
Cloud
Domain
Fog
Domain
IoT IoT IoT
Gateway Gateway Gateway
Sensing
Domain
• VM Migration Attacks
• VM Escape Attacks
• Insider Attacks
Cloud
Domain
Fog
Domain
IoT IoT IoT
Gateway Gateway Gateway
Sensing
Domain
• Flooding Attack: Attacker can flood the neighboring nodes with dummy
packets and request them to deliver those packets to the fog device, where
devices waste energy receiving and transmitting those dummy packets.
Theft-of- Periodic sampling of VMs’ used resources Availability - Fine-grain sampling using high precision clocks
Service Attack Non-Repudiation - Random sampling
VM Escape Hypervisor software bugs Confidentiality - Add an isolation layer between the hypervisor and hardware
Attack Availability
Integrity
Insider Attacks Lack of trust with cloud administrators Confidentiality - Homomorphic Encryption
Integrity - Secret storage through data chopping and permutation based
on a secret key