ca7fa032-3d73-4c3a-8430-7c96ea200df6_IoT_Security.pdf
Document Details
Uploaded by ExcitingRhodonite3899
null
Full Transcript
IoT Reference Model: 7 Layers Functions: Physical Devices & Controllers: generating data and being capable of being controlled over network Connectivity: Communication between Layer 1 Devices Edge (Fog) Comput...
IoT Reference Model: 7 Layers Functions: Physical Devices & Controllers: generating data and being capable of being controlled over network Connectivity: Communication between Layer 1 Devices Edge (Fog) Computing: Evaluate and reformat data for Processing at Higher Levels Data Accumulation: Captures data and stores it so it is usable by applications when necessary Data Abstraction: Reconciles multiple data formats and ensures consistent semantics from various sources Application: Interprets data using software applications. Collaboration & Processes: Consumes and shares the application information. IoT Security 5 Security measures: Securing each devices connected to IoT network Security for all the processes Securing between each level ETSI M2M Purpose of the model: Common framework for understanding the placement of standards and protocols. ETSI M2M Models: Application Domain: Management Function can occur such as data analytics, connectivity management IoT Security 6 Network Domain: Where data exits on the local network and is transported to Application Domain using wired and wireless protocols M2M Devices Domain: Where end devices, such as sensors, actuators and controllers connects to the network through M2M gateways. IoT Simplified Model Functional Layers: Devices Layer: End-devices connected Communication Layer: Devices connected to a local irrigation control panel that monitors the state of the system Application Layer: Control panel connected to a remote data center Aggregate all the control panels IoT Security 7 Data Management Layers: Mist Layer: Close to the ground where things are connected to the network Fog Layer: On a local device that has more power, such as irrigation systemʼs control panel. Cloud Layer: Supervisor can remotely override the autonomous actions of the control panel using a mobile or desktop application in the Cloud Threat Model Analysis IoT Security 8 Lecture 3 What is Zigbee? Zigbee is a suit of protocols and uses low-power digital radios based on IEEE 802.15.4 wireless standard. Zigbee different roles: Coordinator IoT Security 9 Router End-Device Coordinator: sets up the network, one per network, central point of the network. Router: full function devices, powered, non-battery, repeat/forward signal End-Device: reduced function, battery powered, not repeat/forward signals Zigbee Pros and Cons: Pros: Better remotes, power-efficient, secure, stable network Cons: Need a hub, limited range, not every smart devices support Zigbee What is Mesh Network? A network where multiple devices in the network take on the role of a router, or repeater. Rather than only sending signals back to the originator, they repeat signals and forward them to the other network devices within range. What is Thread? A standard for home automation that uses Internet Protocol version 6 IPv6 for routing on top of an IEEE 802.15.4 wireless network. Secure Devices do not join the network unless authorized, all communications are encrypted and secure. Range Typical devices provide sufficient range to cover a normal home. For commercial installations, the Thread Domain model allows multiple Thread networks to communicate with each other over a backbone. Low power: Devices efficiently communicate to deliver an enhanced user experience with years of expected life under normal battery conditions IoT Security 10 Cost-effective: Compatible chipsets and software stacks from multiple vendors IEEE 802.15.4 IEEE 802.15.4 is a wireless networking technology that provides the technical specifications for low-rate wireless personal area networks LRWPANs), allowing networked devices to communicate with one another in a variety of industrial and commercial settings Extremely low cost Ease of implementation Reliable data transfer Short range operation Very low power consumption Disadvantages IEEE 802.15.4 causes interference and multipath fading. Doesnʼt employ a frequency-hopping approach. Unbounded latency Interference susceptibility Device Classes Full function device FFD Any topology; Network coordinator capable; Talks to any other device Reduced function device RFD IoT Security 11 Limited to star topology; Cannot become a network coordinator; Talks only to a network coordinator; Very simple implementation IoT Security 12