Skip to main content

security in IoT or internet of things

SECURITY ISSUES IN IoT:- 

IoT devices have unique characteristics as far as subscription and deployment is concerned.

Few important and useful information about IoT devices:

IoT devices are typically required to be small, low cost, inexpensive

IoT devices should able to operate unattended by humans for extended periods of time

IoT devices should be able to communicate over the wireless WAN or WLAN

IoT devices are typically deployed without having to require much direct human intervention

After deployment the IoT devices tend to require remote management of their functionality

IoT devices also require flexibility in terms of subscription management.

All these functionalities may lead to threats in IOT Device.


Physical Attacks:

These may include :-

insertion of valid authentication tokens into a manipulated device

inserting and/or booting with fraudulent or modified software (“re-flashing”)

environmental/side-channel attacks

These attacks may happen both before and after in-field deployment. To protect from these attacks the need arises for trusted “validation‟ of the integrity of the IoT device’s software and data, including authentication tokens

Compromise of Credentials: 

These attacks are comprising of brute force attacks on tokens and (weak) authentication algorithms. It may also include physical intrusion, or side-channel attacks, as well as malicious cloning of authentication tokens residing on the Machine Communication Identity Module (MCIM)

Configuration Attacks:

These are like fraudulent software update/configuration changes, mis-configuration by the owner, subscriber or user, mis-configuration or compromise of the access control lists.

Protocol Attacks on theDevice

Attacks on the Core Networks

User data and Identity Privacy Attacks





Comments

Popular posts from this blog

EMBEDDED-IOT PLATFORM DESIGN METHODOLOGY

DIFFERENT STAGES OF DESIGN METHODOLOGY OF IoT PLATFORM:-   Stage 1 : Purpose and Requirement Specification  Reason : A robotized water system instrument which turns the siphoning engine ON and OFF on identifying the dampness substance of the earth without the intercession of human  Conduct : System should screen the measure of soil dampness content in soil. In the event that the dirt dampness of the dirt strays from the predefined range, the watering framework is turned ON/OFF. If there should arise an occurrence of dry soil, it will actuate the water system framework, siphoning water for watering the plants.  Framework Management Requirements : framework ought to distantly give checking and control capacities  Information Analysis Requirements : framework ought to perform neighborhood investigation of information  Application Deployment Requirement : Deployed locally on gadget, however acts distantly without manual intercession.  Security : Authentication to Use the framework should b

Cellular Networks Work for IoT

  How  Cellular Networks Work for IoT (internet of things). working of cellular networks for IoT is described below. Cell networks give the spine to a lot of what we know and love, permitting us to get to the web, get rides, interface with companions, shop, watch recordings, and significantly more. Notwithstanding the individual advantages we're all acquainted with, cell networks likewise serve a basic and developing part in numerous Internet of Things applications.  In a portion of my past posts, I've investigated other network innovations including WiFi, Bluetooth, and LPWANs. The explanation we have such countless choices for availability is on the grounds that IoT applications can contrast definitely, which means differing prerequisites.  Despite the fact that network advancements keep on being improved, eventually, there will consistently be a tradeoff between power utilization, reach, and transmission capacity. Cell availability has generally been centered around reach an