Vous êtes sur la page 1sur 20

Seminar Review 1

Internet of
Things
Security and Data Encryption
AGENDA

Introduction to IoT

Architectures of IoT Devices

IoT Security Concerns and Measures

Data Encryption

Criticism, Problems and Applications


Internet of Things
Introduction

In short, IoT is a concept that connects all


the devices to the internet and let them
communicate with each other over the
internet. IoT is a giant network of
connected devices – all of which gather
and share data about how they are used
and the environments in which they are
operated.

The ‘Thing’ in IoT can be any device with


any kind of built-in-sensors with the ability
to collect and transfer data over a network
without manual intervention.
Architecture
Cloud
and Fog
Architecture

Three and Social


Five Layer
Architecture
IoT
Architecture
Three Layer
Architecture

The most basic architecture is a three-


layer architecture. It has three layers,
namely, the perception, network, and
application layers.

(i)The perception layer is the physical layer.

(ii)The network layer is responsible for


connecting to other smart things, network
devices, and servers.

(iii)The application layer is responsible for


delivering application specific services to
the user.
Five Layer
Architecture

One is the five-layer architecture, which


additionally includes the processing and
business layers.
The layers are:

(i)The transport layer transfers data from


the perception layer to the processing
layer and vice versa through networks.

(ii)The processing layer is also known as


the middleware layer. It stores, analyzes,
and processes huge amounts of data that
comes from the transport layer.

(iii)The business layer manages the whole


IoT system.
Cloud and Fog
Architecture

In some system architectures the data


processing is done in a large centralized
fashion by cloud computers. Such a cloud
centric architecture keeps the cloud at the
center, applications above it, and the
network of smart things below it. Cloud
Lately, there is a move towards another system
computing is given primacy because it
architecture, namely, fog computing, where the
provides great flexibility and scalability. It sensors and network gateways do a part of the
offers services such as the core data processing and analytics. A fog architecture
infrastructure, platform, software, and presents a layered approach, which inserts
storage. monitoring, preprocessing, storage, and security
layers between the physical and transport layers.

Often the terms “fog computing” and


“edge computing” are used
interchangeably. Fog computing originally
termed by Cisco refers to smart gateways
and smart sensors, whereas edge
computing is slightly more penetrative in
nature.
Social IoT
Architecture

We consider social relationships between


objects the same way as humans form
social relationships. Here are the three
main facets of an SIoT system:
(i)The SIoT is navigable. We can start with
one device and navigate through all the
devices that are connected to it. It is easy
to discover new devices and services using
such a social network of IoT devices.

(ii)A need of trustworthiness (strength of


the relationship) is present between
devices (similar to friends on Facebook).

(iii)We can use models similar to studying


human social networks to also study the
social networks of IoT devices.
Security
Internet of Things
Security

A number of challenges prevent the


securing of IoT devices and
ensuring end-to-end security in an
IoT environment. Because the idea
of networking appliances and other
objects is relatively new, security
has not always been considered
top priority during a product's
design phase.

A major issue cited with IoT security is the use of hardcoded or default
passwords, which can lead to security breaches.
Another common issue facing IoT devices is that they are often resource-
constrained and do not contain the compute resources necessary to
implement strong security.
Internet of Things
Security

Data Encryption

Data IoT Hardware


Authentication Issues

Managing Safe Storage


updates

Major Concerns
Internet of Things
Security Measures

Incorporating security at the design phase. IoT developers should


include security at the start of any consumer-, enterprise- or industrial-
based device development.
PKI and digital certificates. Public key infrastructure (PKI) and 509
digital certificates play critical roles in the development of secure IoT
devices, providing the trust and control needed to distribute and
identify public encryption keys, secure data exchanges over networks
and verify identity.
Hardware security. Endpoint hardening includes making devices
tamper-proof or tamper evident.
Strong encryption is critical to securing communication between
devices. Data at rest and in transit should be secured using
cryptographic algorithms.
Consumer education. Consumers must be made aware of the dangers
of IoT systems and provided steps they can take to stay secure, such as
updating default credentials and applying software
Data
Encryption
Data Encryption
Transport Layer Security (TLS) provides
security for transferring data over the
network. The data is encrypted to prevent
anyone from listening to and
understanding the content.

TLS (also known as SSL) is widely used to


provide secured access to many websites.
Advantages
TLS ensures that trust is established Complete end-to-end message
between the server and the client before security
data transfer happens. It does so by use of
server certificates that clients must Adds another layer of security for
validate. applications that are transmitting
highly sensitive data
In some cases, the server also validates
client specific certificates. Appropriate in situations where
TLS cannot be used
Internet of Things

Criticism and
Problems
Problems

75% 36% 73% 40%

Privacy Data Storage Security Platform fragmentation

Autonomy and Control Processing vast amounts of Lacking secure In-consistency among
data communication protocols applications
Internet of Things
Applications
Applications

Consumer Applications
Smart Homes
Elder Care

Commercial Applications
Medical and Health Care
Transportation

Industrial Applications
Manufacturing
Agriculture

Infra-structure Application
Metropolitan Scale Developments
Energy Management
Living Laboratories
Seminar Review 1

Thank You
Kunal Prasad
Vardhan Bonthu

1st February 2019

Vous aimerez peut-être aussi