IoT Security Challenges

SweetFern avatar
SweetFern
·
·
Download

Start Quiz

Study Flashcards

8 Questions

What are some of the main challenges related to the security of IoT networks?

Updating the firmware and software of the devices

Why is the security of mobile devices important?

Multiple reasons including camera usage, communication, Internet browsing, GPS, payment wallet, access management, and personal information storage.

Online transactions through mobile account for about 55% in Europe.

True

What is the main difference between wired and wireless network security?

Accessibility to physical access points

What are examples of wired network security protocols and standards?

All of the above

Passive attacks on wireless networks involve attempts to damage digital resources.

False

The major vulnerabilities of wireless security may include Reconnaissance, Resource Stealing, and Rogue ___ Points.

Access

Match the wireless security vulnerability with its description:

Reconnaissance Vulnerability = Catching wireless signals within the range Resource Stealing = Manipulating routing tables for intrusion Rogue Access Points (APs) = Weak secure points exploited for attacks

Study Notes

Network Security Basics

  • Wired network security:
    • Advantages: lower interference, higher bandwidth, and lower latency
    • Risks: security breaches through physical access to cables
    • Protocols for protection: IEEE 802.1X, IPsec, SSL/TLS
  • Wireless network security:
    • Vulnerabilities: open air medium, easily accessible signals
    • Protocols for protection: 802.11b, 802.11g, 802.11n

LAN Vulnerabilities

  • Wireless Local Area Network (WLAN) vulnerabilities:
    • Passive attacks: information gathering for future attacks
    • Active attacks: worms, viruses, Trojan horses
  • Types of attacks:
    • Reconnaissance or lack of physical security
    • Resource stealing
    • Rogue Access Points (APs)
    • STA (Station) and AP plain text transaction
    • Denial of Service (DoS)
    • Default AP configuration
    • Rogue insiders
    • Protocol vulnerabilities
    • Ad-hoc network mode security problems

Reconnaissance Vulnerability

  • Wireless router signals can be caught by hackers using powerful antennas
  • Signals can be boosted to increase the coverage area of the wireless network
  • Increased strength of Wi-Fi signals increases the reconnaissance vulnerability

Resource Stealing

  • Hackers use wireless routers to manipulate routing tables and intelligent algorithms
  • Devices connected to the switch through network cables can be invaded
  • Hackers can steal useful data for future cyberattacks

Rogue Access Points (APs)

  • Rogue APs are connected to the network with weak security features
  • APs can be configured for passive attacks to steal information
  • Legitimate users connect to the rogue AP, which routes traffic through it
  • Traffic is intercepted and analyzed for useful data for future attacks

STA (Station) and AP Plain Text Transaction

  • Traffic redirection is done by exploiting network vulnerabilities
  • MAC spoofing and session hijacking enable traffic redirection
  • Plain text information is intercepted, and MAC addresses are achieved
  • Hacker can spoof the MAC address and intrude into the network

Denial of Service (DoS)

  • DoS attacks are easier to carry out in wireless networks
  • Factors: easy access to the wireless medium, powerful radio devices, wireless jammers
  • Legitimate users can be prevented from accessing the network by spoofing authentication and association sessions

Default AP Configuration

  • Default configurations of APs are a big vulnerability
  • Default usernames and passwords are known, making it easy for hackers to access the router
  • Access to the router is free without a password by default

Rogue Insiders

  • Hackers can exploit rogue insiders to compromise network security
  • Rogue employees can leak data or connect their laptops to the network through a wire and provide access to hackers

Protocol Vulnerabilities

  • STA and AP start authentication and association through plain text conversation
  • WEP protocol is very insecure and can be broken within a minute
  • WPA uses pre-shared keys, which are vulnerable in modern security scenarios
  • WPA uses message integrity checks and Temporal Key Integrity Protocol (TKIP)

Ad-hoc Network Mode Security Problems

  • Ad-hoc networking is supported by many operating systems
  • Every node in the network connects with its peer without security firewalls
  • Viruses, worms, or malware can easily travel from one node to another

IoT Vulnerabilities

  • IoT is a network of IP-enabled devices controlled through a centralized unit
  • Examples of IP-enabled devices include printers, door locks, fridges, and more
  • Main challenges in IoT security include:
    • Securing wireless-enabled connected devices
    • Updating firmware and software
    • Securing communication between nodes
    • Detecting vulnerabilities
    • Securing authentication and authorization
    • Securing mobile and web applications
    • Ensuring data integrity and privacy

Mobile Network Security

  • Importance of mobile security:
    • Used for recording memories through photos and videos
    • Used for communication through voice calls, SMS, chats, video calls, and emails
    • Used for online shopping and browsing
    • Used for navigation through maps and GPS
    • Used for physical access management and digital access management
    • Used for storing valuable contacts and personal information

This quiz covers the main challenges related to the security of IoT networks, including securing devices, updating firmware, and detecting vulnerabilities.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

IoT Security Quiz
5 questions

IoT Security Quiz

ReputableSerpentine avatar
ReputableSerpentine
Internet of Things (IoT) Overview and Applications
20 questions
Use Quizgecko on...
Browser
Browser