IoT Module-3 Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

SUBJECT: IOT & WIRELESS SENSOR NETWORKS (17EC752/15EC752)


MODULE: 3

1. Introduction:

To develop the IoT software five levels are needed:


(i) Gather + Consolidate, (ii) Connect, (iii) Collect + Assemble,
(ii) (iv) Manage and Analyse and (v) Applications and Services.

2. Prototyping Embedded Device Software:

 Prototype deployment of the programs require boot loader, OS and IDE. Software
embeds into a design platform.
 IDE enables development of software at first level and second level for embedding
into a device platform.
 Boot loader firm ware stores at Flash/ROM of a microcontroller in a device and
enables communication with a computer having an IDE.
 IDE consist of API’s, Libraries, compilers, RTOS, Simulator, editor, assembler,
debugger and so on.
 IDE enables the development of codes on a computer and later on downloading of
codes on to be embedded device.

3. Programming Embedded Device Arduino Platform using IDE:

 Arduino board can be programmed using avr-gcc tools. The Arduino board has a pre-
installed bootloader embedded into the firmware.
 Arduino programmer develops the codes using a graphical cross-platform IDE.
Arduino provides simplicity.
 IDE of Arduino board also has simplicity, is based on processing language and
makes the programming easy.
 The Arduino bootloader provisions for multitasking by the usage of interrupt.
 The Arduino IDE includes a C/C++ library. The library is called Wiring for a
project of the same name with open source module at a website
4. Devices, Gateways, Internet And Web/Cloud Services Software
development:

 The fig. shows five levels for software development for applications and services
in the IoT or M2M.
 The software needs are for the devices, local network, gateway, cloud/web
connectivity and web/cloud APIs.
 Software, such as Eclipse IoT, enable the development of software for the first,
second and third levels.
 The software enables the device gateways connectivity to the Internet and cloud
server.
 IoT enables the open source implementation of IoT protocols.

Fig. Five levels for software development applications and services for IoT or M2M.
5. IoT Privacy and Security:
Introduction:
 International organizations are making a number of efforts towards ensuring that IoT
design must ensure trust, data security and privacy.
 Message: String that represents data.
 Hash: Collection or bundles which gives irreversible result after many operations on data.
 Digest: It is a process which gives irreversible results involving many operations.
 Encryption: It is a process of generating new data using a secret key known only to a
receiver.
 Decryption: which retrieves the data from the encrypted data.
 Use Case: It means a list of event steps which defines the interaction between two ends.
 Misuse case: It can be understood as reverse sense of use case.

6. VULNERABILITIES, SECURITY REQUIREMENTS AND THREAT


ANALYSIS:
Privacy
 Message privacy means that the message should not reach into the hands of the unrelated
entities.
 When data or messages communicate from the things (device platforms), those are meant
only for the applications or services and for targeted goals only.
 Privacy also means no interference or disturbance from other. Consider an example of
messages from embedded devices in an automobile using the Internet to an automobile
service centre.
 Privacy means the messages reach only the centre and used only by the services of the
centre.
Vulnerabilities of IoT
 Vulnerability means weak without complete protection, weakness to defend oneself or
can be easily influenced from surrounding unwanted things from itself.
 An IoT security article describes that there are many vulnerabilities, due to participation
of the number of layers, hardware sub layers and software in applications and services.
 The nature of IoT also varies. For example, sensors, machines, automobiles, wearables,
and so on. Each faces different kind of vulnerabilities and has complex security and
privacy issues.
Security Requirements:
 IoT reference architecture means a guide for one or more concrete architects. IoT
reference architecture is a set of three architectural views—functional, information, and
deployment and operational.
 Security FG contains five sets of functions which are required for ensuring security and
privacy. Large number of devices, applications and services communicate in IoT.
 Five functional components (FCs) of security are defined in IoT reference architecture.
Following are five functional components (FCs):
1. Identity management (IdM)
2. Authentications
3. Authorisation
4. Key exchange and management
5. Trust and reputation.

Fig. Security function group components.


Threat Analysis:
 A threat-analysis tool first generates the threats and analyses a system for threat(s).
 Threat analysis means uncovering the security design flaws after specifying the stride
category, data flow diagram, elements between that the interactions occurring during the
stride, and processes which are activated for analysis.
 Stride means a regular or steady course, pace or striding means, passing over or across in
one long step.

Fig. An application threat model.

7. Security Tomography:

 Computational tomography means a computing method of producing a three-dimensional


picture of the internal structures of an object, by observation and recording of the
differences in effects on passage of energy waves impinging on those structures.
 Computational security in complex set of networks utilizes the network tomography
procedures of identifying the network vulnerabilities. This enables design of efficient
attack strategies.
 A complex set of networks may be distributed or collaborative. Network tomography
refers to the study of vulnerabilities and security aspects for network monitoring in a
complex system.
8. Layered attacker model:
 The fig shows the layer attacker model and possible attacks on the layers.

Fig. Layer attacker model.


 Layer 1 Attacks Solution:
 Solution depends on the devices used. Example Zig Bee at link level security using AEC-
CCM-128.
 Layer 2 Attacks Solution:
 Programming the network switches to prevent internal node attacks during use of DHCP
or STP.
 Layer 3 Attacks Solution:
 Use of temper resistant router, use of packet filtering and controlling routing messages
and packets data between layer 3 & 4 through a firewall reduces the risk.
 Layer 4 Attacks Solution:
 Port scanning method is a solution which identifies the vulnerable port.
 Layer 5 & 6 Attacks Solution:
 Looking primarily at application level attacks which are results of poor coding
architecture.

******************

You might also like