0% found this document useful (0 votes)
22 views27 pages

Internet of Things (IoT) - Lecture 8

Uploaded by

inboxmwita
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views27 pages

Internet of Things (IoT) - Lecture 8

Uploaded by

inboxmwita
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Internet of Things (IoT)

IT 8311
Credit rating: 10

LECTURE VIII.
Eng.Malissa
[email protected]
Security in IoT
Outline
• Device Authentication and Identity Management
• Data Encryption
• Secure Communication
• Firmware and Software Updates
• Secure Gateway and Network
• Physical Security
• Privacy and Data Protection
• Monitoring and Logging
• Security by Design
• Security Standards and Certifications
• User Awareness and Education
Introduction.
• While, IoT offers numerous benefits and opportunities,
it also presents unique security challenges due to the
large number of devices and the diverse range of their
capabilities.
 Importance of security in IoT
 Protecting data, privacy, and infrastructure
 Mitigating risks of unauthorized access and attacks
Device Authentication and Identity
Management.
 Unique device identities
Ensures each device has a distinct identity
Enables secure communication and access control
 Strong authentication mechanisms
Passwords, cryptographic keys, biometrics
 Secure boot and digital certificates
Verifying the authenticity and integrity of device software

Data Encryption.
 Protecting data at rest and in transit
Encryption transforms data into unreadable format
Prevents unauthorized access
 Encryption techniques
Symmetric encryption (AES) for efficient data protection
Asymmetric encryption (RSA) for key exchange and digital signatures
 TLS and AES for secure data encryption
Transport Layer Security for secure communication
Advanced Encryption Standard for data confidentiality
Secure Communication.
 Establishing secure channels
Prevents eavesdropping, tampering, and data interception

 HTTPS, MQTT with TLS, and CoAP with DTLS


HTTPS: Secure web communication using TLS
MQTT with TLS: Secure publish-subscribe messaging protocol
CoAP with DTLS: Secure communication for resource-constrained devices

 Ensuring data integrity during transmission


Message integrity checks using cryptographic hashes
Verification of message authenticity
Firmware and Software Updates.
 Regular updates to address vulnerabilities
Security patches, bug fixes, feature enhancements
Protection against known exploits and weaknesses

 Secure and automated update mechanisms


Encrypted update packages
Code signing and verification
Rollback protection to prevent unauthorized downgrades

 Patch management and device functionality


Timely deployment of updates
Ensuring updates do not disrupt device functionality
Secure Gateway and Network.
 Securing IoT gateways
Central points for data aggregation and communication
Protecting against unauthorized access

 Firewalls and intrusion detection systems


Filtering network traffic
Detecting and blocking malicious activities

 VPNs for secure network communication


Securely connecting devices across networks
Encrypting data between endpoints
Physical Security.
 Protecting against physical access risks
Tamper-evident seals and secure enclosures
Preventing unauthorized tampering or extraction of components
 Access controls and disposal of decommissioned devices
Strong access control mechanisms (e.g., biometrics, access cards)
Secure disposal to prevent data leakage
Privacy and Data Protection.
 Handling personal and sensitive data
Adhering to privacy regulations (e.g., GDPR)
Minimizing data collection and retention

 Data anonymization and consent management


Protecting privacy by removing personally identifiable information
Obtaining user consent for data processing and sharing

 Secure storage and compliance with regulations


Encryption and access controls for stored data
Regular audits and compliance assessments
Monitoring and Logging.
 Continuous monitoring for security incidents
Real-time detection of anomalies and suspicious activities
Intrusion detection systems and security event monitoring

 Analyzing logs for threat detection


Log aggregation and analysis for identifying security events
Correlation of logs for incident response and forensic investigations

 Timely response to security events


 Incident response procedures and incident management teams
Security by Design.
 Incorporating security from the design phase
Identifying and addressing potential security risks early on
Secure architecture and robust security controls
 Secure development practices
Secure coding standards and best practices
Code reviews and vulnerability testing
 Security assessments and controls throughout the lifecycle
Regular security audits and penetration testing
Continuous monitoring and updates
Security Standards and Certifications.
 Adhering to recognized security standards
ISO/IEC 27000 series for information security management
NIST Cybersecurity Framework for best practices and risk
management
IEC 62443 for industrial IoT security
 Obtaining relevant certifications
Demonstrates adherence to security standards and best practices
Provides assurance to customers and stakeholders
User Awareness and Education.
 Promoting best practices
Strong passwords, regular updates, and device hygiene
Awareness about phishing attacks and social engineering
 Secure IoT usage guidelines
Educating users on device configuration and privacy settings
Providing guidance on safe IoT device installation and setup
Conclusion.
 Summary of key points
Device authentication, data encryption, secure communication
Firmware and software updates, secure network and gateway
Physical security, privacy and data protection, monitoring and logging
Security by design, standards and certifications, user awareness

 Continuous and multi-layered approach


Security is an ongoing process, evolving with emerging threats

 Importance of staying updated


Keeping up with the latest security technologies and best practices
IoT Cloud
Performance
Factors Affecting IoT Cloud Performance.
 Scalability
 Latency
 Data Ingestion and Processing
 Connectivity and Interoperability
 Security
 Reliability and Availability
 Analytics and Insights
Scalability.
• Ability to handle large-scale deployments and
scale horizontally to accommodate increasing
workloads.
Latency.
• Real-time or near real-time response with low
latency for timely data processing and event
triggers.
• Low latency infrastructure and optimized data
processing pipelines.
Data Ingestion and Processing.
• Efficiently handle large volumes of IoT data,
apply real-time analytics, and derive actionable
insights.
• Real-time analytics to derive insights, trigger
actions, and make data-driven decisions.
Connectivity and Interoperability.
• Support multiple communication protocols and
ensure seamless connectivity with diverse IoT
devices.
 Support for popular IoT communication
protocols such as MQTT, CoAP, and HTTP.
 Interoperability with various IoT devices,
sensors, and gateways for seamless integration.
Security.
• Implement robust security measures to protect
sensitive IoT data, including data encryption,
access control, and authentication.
 Data encryption in transit and at rest to protect
against unauthorized access.
 Robust access control mechanisms and user
authentication for secure IoT data handling.
Reliability and Availability.
• Ensure high availability, fault-tolerance, and
minimal service disruptions in critical IoT
environments.
• Highly available infrastructure with redundant
components and failover mechanisms.
• Proactive monitoring and fault-tolerance to
minimize service disruptions and ensure continuous
operation
Analytics and Insights.
• Provide advanced analytics capabilities for data
visualization, predictive analytics, and machine
learning.
 Advanced analytics tools to process and analyze IoT data in
real-time.
 Data visualization dashboards, predictive analytics, and
machine learning for actionable insights.
Conclusion.
• Evaluate IoT cloud platforms based on
scalability, latency, data processing capabilities,
connectivity, security, reliability, and analytics.
• Choose a platform that aligns with specific IoT
deployment requirements and use cases.
• Prioritize performance factors that are critical
for your IoT project's success.
END.

You might also like