IoT With Cloud Computing - Unit 4
IoT With Cloud Computing - Unit 4
PRUDHVI KIRAN P
Assistant Professor, CSE - IOT Dept.
R. V. R. & J. C. College of Engineering
UNIT - 4 [ 13 Periods ]
loT with secure Cloud
Cloud Threats in loT, APl's in loT, Authentication in loT, Strategies for securing loT in Cloud,
Public key Cryptography.
IoT Devices/Things
Internet/Cloud
UNDERSTANDING IN DETAIL ABOUT API
https://
medium.com/star-gazers/understanding-apis-everything-you-need-to-know-about-apis-b0bf
53db6adf UNDERSTANDING ABOUT APIs IN IOT
https://www.hologram.io/blog/iot-apis-guide/
4.3. Authentication in loT
Devices in above graphical ecosystem, include traditional endpoints, such as computers, laptops,
mobile phones, tablets and servers, as well as non-traditional items, such as printers, cameras,
appliances, smart watches, health trackers, navigation systems, smart locks, smart thermostats, etc.
1. Implement Better Password Practices
Sometimes the simplest methods are the most effective. Brute force methods are surprisingly
effective for hackers. Brute force is an attack method used by hackers that consists of automatically
trying to get the correct password by trying numerous times until it gets it right.
While this method seems like it would take an enormous amount of time, hackers have many ways
of optimizing it. For starters, trying combinations of frequently used passwords makes it a safer bet
that it will eventually get it right. Another useful method is trying the default passwords for every
single device in your system. Remember, since everything is connected with each other in IoT
projects, even an IoT coffee maker without a proper password can compromise the entire project.
This issue can be solved by guaranteeing that good password practices are being applied throughout
the whole project. Apply practices such as:
• Change default passwords as soon as the object is booted up for the first time
• Do not use easily guessable passwords like “12345”, a birthday, a name, “admin”, “password”, etc.
• Incorporate combinations of letters, numbers, and symbols into each of your passwords
• Do not use the same password for every device or even multiple devices
• Use a password manager
• Instead of using a password utilize Public Key Cryptography
2. Encrypt Data When Connected to the Internet
Data sent through the internet can be accessed and read if it is intercepted by hackers. Using a VPN
with encryption can make your data more secure.
Encrypting data means taking the plaintext and converting it into a ciphertext, usually by a
randomly generated key. The information gets encrypted from one end, then it gets sent over the
internet, and finally, it gets deciphered on the other end.
This means that even if your information was accessed by a hacker, it would be impossible to
understand. Encryption is a great tool for guaranteeing the integrity and secrecy of your
information.
3. Use VPN
Using a VPN (stands for Virtual Private Network) can also change your IP address. A VPN is created
when a point-to-point connection is established with tunneling protocols. This means that your
project’s IP address, the number that identifies any device’s place in a network, can change to
reflect the new one used with the VPN.
By applying a VPN across your IoT networks, you can make those networks much more robust and
secure. And any Internet-connected device can use a VPN to be a part of a private network. Devices
can range from standard consumer devices like cameras to specialized industrial sensors or other
operational tools.
4. Generating a Local Backup
Cloud technology is very advantageous, but at the same time, it is also very vulnerable technology
that is prone to attacks. Now-a-days, IoT Device manufacturing companies often give users cloud
storage space free for their purchase. Although it is appealing to have a free item, users must also
be careful about the security measures and make sure that they secure the data and store their
data locally beyond the reach of hackers.
5. Set a Effective Monitoring System
Implementing a strong IoT security framework can seem challenging in a complex ecosystem with
numerous internal and external parties. Introducing a monitoring system allows proper asset
inventory, visibility, identity, and control of interconnected devices. The approach must be
comprehensive, and following five-stage model is recommended:
Identify
Protect
Detect
Respond
Recover
6. Implementing a Network Access Control (NAC)
A NAC solution with a proper switch detects most devices and identifies rogue connections to the
network. It can also apply controls to the devices that are unauthorized.
7. Running an IDS (intrusion detection system) and IPS (intrusion prevention system) on the
network:
Running an IDS or IPS on the network will offer a good indication of when an IoT device has been
compromised.
8. Secure Communication Protocols:
Ensure that your IoT devices communicate over secure protocols such as HTTPS or MQTT with
Transport Layer Security (TLS) encryption.
9. Consider patching and remediation efforts
Patching and remediation involve changing the code of connected devices over time to ensure
optimal security. Before implementing a networked device, organizations must consider if the
device can be patched over time to combat the ever-changing threat landscape.
Some devices are limited in their capabilities, or are too complex to comprehensively patch.
Therefore, remediation must be considered well before implementing a new IoT device into your
network.
10. Making sure to periodically update the IoT device
Users need to update the IoT system while automatic updates must be enabled by the
manufacturing company itself so that the device check for official updates automatically.
This will ensure the automatic installation of security updates on the IoT devices and stops
unauthorized persons from finding new ways of accessing the system.
Hackers often target outdated devices, so staying up-to-date is a crucial defense against IoT cloud -
attacks.
11. Differentiate Your Product
All IoT devices are manufactured with giving priority to easy connectivity in mind. IoT devices from
various manufacturers can be used as simple as plug n play. This may provide ease of understanding
and usage to the user; but this may also open way to the threats. So it is always a good practice, to
manufacture your device a little different, in view of connectivity and network access.
END OF UNIT 4