SlideShare une entreprise Scribd logo
1  sur  65
Télécharger pour lire hors ligne
Unit – 4
IoT Protocols and
Security
Protocol Standardization for IoT
• IoT-Architecture one of the few efforts targeting a
holistic architecture for all IoT sectors
• This consortium consists of 17 European
organizations from nine countries
• Summarized current status of IoT standardization as
• Fragmented architectures
• No holistic approach to implement IoT has yet been
proposed
• Many island solutions do exist (RFID, sensor nets, etc.)
• Little cross-sector reuse of technology and exchange of
knowledge
20 March 2018 Unit 4 - IoT Protocols and Security 2
M2M and WSN Protocols
• Most M2M applications are developed today in a
highly customized fashion
• High-level M2M architecture from M2M
Standardization Task Force (MSTF) does include
fixed & other non cellular wireless networks
• Means it’s generic, holistic IoT architecture even
though it is M2M architecture
• M2M and IoT sometimes are used interchangeably
in the United States
20 March 2018 Unit 4 - IoT Protocols and Security 3
M2M and WSN Protocols
• Other M2M standards activities include:
• Data transport protocol standards - M2MXML, JavaScript
Object Notation (JSON), BiTXML, WMMP, MDMP
• Extend OMA DM to support M2M devices protocol
management objects
• M2M device management, standardize M2M gateway
• M2M security and fraud detection
• Network API’s M2M service capabilities
• Remote management of device behind gateway/firewall
• Open REST-based API for M2M applications
20 March 2018 Unit 4 - IoT Protocols and Security 4
SCADA and RFID Protocols
• Supervisory Control And Data Acquisition
• One of the IoT pillars to represent the whole
industrial automation arena
• IEEE created standard specification called Std
C37.1™, for SCADA & automation systems in 2007
• In recent years, network-based industrial
automation has greatly evolved
• With the use of intelligent electronic devices (IEDs),
or IoT devices in our terms, in substations and
power stations
20 March 2018 Unit 4 - IoT Protocols and Security 5
SCADA and RFID Protocols
20 March 2018 Unit 4 - IoT Protocols and Security 6
SCADA and RFID Protocols
• The processing is now distributed
• Functions that used to be done at control center
can now be done by IED i.e. M2M between devices
• Due to restructuring of electric industry, traditional
vertically integrated electric utilities are replaced by
many entities such as
• GENCO (Generation Company),
• TRANSCO (Transmission Company),
• DISCO (Distribution Company),
• ISO (Independent System Operator), etc.
20 March 2018 Unit 4 - IoT Protocols and Security 7
Issues with IoT Standardization
• It should be noted that not everything about
standardization is positive
• Standardization is like a double-edged sword:
• Critical to market development
• But it may threaten innovation and inhibit change when
standards are accepted by the market
• Standardization and innovation are like yin & yang
• They could be contradictory to each other in some
cases, even though this observation is debatable
20 March 2018 Unit 4 - IoT Protocols and Security 8
Issues with IoT Standardization
• Different consortia, forums and alliances have been
doing standardization in their own limited scope
• For example, 3GPP covers only cellular wireless
networks while EPCglobal’s middleware covers only
RFID events
• Even within same segment, there are more than
one consortium or forum doing standardization
without enough communication with each other
• Some are even competing with each other
20 March 2018 Unit 4 - IoT Protocols and Security 9
Issues with IoT Standardization
• Some people believe that the IoT concept is well
established
• However, some gray zones remain in the definition,
especially which technology should be included
• Following two issues for IoT standardization in
particular and ICT standardization in general may
never have answers:
20 March 2018 Unit 4 - IoT Protocols and Security 10
Issues with IoT Standardization
1. ICT standardization is a highly decentralized
activity. How can the individual activities of the
network of extremely heterogeneous standards-
setting bodies be coordinated?
2. It will become essential to allow all interested
stakeholders to participate in the standardization
process toward the IoT and to voice their
respective requirements and concerns. How can
this be achieved?
20 March 2018 Unit 4 - IoT Protocols and Security 11
Unified Data Standards
• Already discussed about two pillars of the Internet
• HTML/HTTP combination of data format and
exchange protocol is the foundation pillar of WWW
• Described great number of data standards and
protocols proposed for four pillar domains of IoT
• Many issues still impede the development of IoT
and especially WoT vision
20 March 2018 Unit 4 - IoT Protocols and Security 12
Unified Data Standards
Evolution
of web
20 March 2018 Unit 4 - IoT Protocols and Security 13
Unified Data Standards
• Many standardization efforts have been trying to
define unified data representation, protocol for IoT
• Before IoT, Internet was actually an Internet of
documents or of multimedia documents
• Two pillars of Internet including HTML/HTTP turned
the Internet into WWW
• We need to turn the IoT into the WoT
• What will it take to make this to happen?
20 March 2018 Unit 4 - IoT Protocols and Security 14
Unified Data Standards
• Do we need a new HTML/HTTP-like standard for
MTC and WoT? If there is no need to reinvent the
wheel, what extensions do we need to build on top
of HTML/HTTP or HTML5?
• Browser is intended for humans, so do we need new
browser for machines to make sense of ocean of
machine-generated data? If not, what extensions
do we need to make to the existing browsers?
20 March 2018 Unit 4 - IoT Protocols and Security 15
Unified Data Standards
• Today, most new protocols are built on top of XML.
For OS there must be XML-based data format
standards or a metadata standard to represent the
machine-generated data (MGD). Is it possible to
define such a metadata standard that covers
everything?
20 March 2018 Unit 4 - IoT Protocols and Security 16
Unified Data Standards
• There are many different levels of protocols
• But the ones that most directly relate to business
and social issues are the ones closest to the top
• so-called application protocols such as HTML/HTTP
for the web
• Web has always been visual medium, but restricted
• Until recently, HTML developers were limited to CSS
& JavaScript in order to produce animations
• Or they would have to rely on a plug-in like Flash
20 March 2018 Unit 4 - IoT Protocols and Security 17
Unified Data Standards
20 March 2018 Unit 4 - IoT Protocols and Security 18
Protocols – IEEE 802.15.4
• Defines operation of low-rate wireless personal
area networks (LR-WPANs)
• Specifies physical layer and media access control
for LR-WPANs
• Maintained by IEEE 802.15 working group, which
defined the standard in 2003
• Basic framework conceives a 10m communications
range with a transfer rate of 250 kbit/s
20 March 2018 Unit 4 - IoT Protocols and Security 19
Protocols – IEEE 802.15.4
20 March 2018 Unit 4 - IoT Protocols and Security 20
• Physical Layer (PHY)
provides data transmission
service & interface to
physical layer management
entity
• MAC enables transmission
of MAC frames through the
use of the physical channel
BACNet Protocol
• Communications protocol for Building Automation
and Control (BAC) networks
• Provides mechanisms for computerized building
automation devices to exchange information
• Designed to allow communication of building
automation & control system for application like
• Heating, Ventilating and Air-conditioning Control (HVAC)
• Lighting Control, Access Control
• Fire Detection Systems and their Associated Equipment
20 March 2018 Unit 4 - IoT Protocols and Security 21
BACNet Protocol
• Defines a number of services that are used to
communicate between building devices
• Protocol services include Who-Is, I-Am, Who-Has, I-
Have which are used for Device & Object discovery
• Services such as Read-Property and Write-Property
are used for data sharing
• Defines 60 object types that are acted upon by
services
• Defines no. of data link/physical layers including
20 March 2018 Unit 4 - IoT Protocols and Security 22
BACNet Protocol
• ARCNET,
• Ethernet,
• BACnet/IP,
• BACnet/IPv6,
• Point-To-Point over RS-232,
• Master-Slave/Token-Passing over RS-485,
• ZigBee
• LonTalk
20 March 2018 Unit 4 - IoT Protocols and Security 23
Modbus
• Serial communications protocol originally published
by Modicon (now Schneider Electric) in 1979
• Commonly available for connecting industrial
electronic devices
• Reasons for use of Modbus in industrial environment:
• Developed with industrial applications in mind
• Openly published and royalty-free
• Easy to deploy and maintain
• Enables communication among many devices
connected to the same network
20 March 2018 Unit 4 - IoT Protocols and Security 24
Modbus Object Types
20 March 2018 Unit 4 - IoT Protocols and Security 25
Object type Access Size
Coil Read-write 1 bit
Discrete input Read-only 1 bit
Input register Read-only 16 bits
Holding register Read-write 16 bits
Protocol Versions
• Modbus RTU
• Modbus ASCII
• Modbus TCP/IP or Modbus TCP
• Modbus over TCP/IP or Modbus over TCP or
Modbus RTU/IP
• Modbus over UDP
• Modbus Plus (Modbus+, MB+ or MBP)
• Pemex Modbus
• Enron Modbus
20 March 2018 Unit 4 - IoT Protocols and Security 26
KNX Protocol
• Standardized (EN 50090, ISO/IEC 14543), OSI-based
network communications protocol for automation
• Defines several physical communication media:
• Twisted pair wiring (inherited from the BatiBUS and EIB
Instabus standards)
• Powerline networking (inherited from EIB and EHS -
similar to that used by X10)
• Radio (KNX-RF)
• Infrared
• Ethernet (also known as EIBnet/IP or KNXnet/IP)
20 March 2018 Unit 4 - IoT Protocols and Security 27
KNX System Components
• All the devices for a KNX installation are connected
together by a two wire bus to exchange data
• Sensors
• Actuators
• System devices and components
20 March 2018 Unit 4 - IoT Protocols and Security 28
ZigBee
• IEEE 802.15.4-based specification for a suite of
high-level communication protocols
• Used to create personal area networks with small,
low-power digital radios
• ZigBee based applications
• Home Automation
• Medical Device Data Collection
• other low-power low-bandwidth
20 March 2018 Unit 4 - IoT Protocols and Security 29
ZigBee Architecture
20 March 2018 Unit 4 - IoT Protocols and Security 30
ZigBee Architecture
• Divided into three sections
• IEEE 802.15.4 which consists of MAC and physical layers
• ZigBee layers, which consist of the network layer, the
ZigBee device object (ZDO), the application sublayer, and
security management
• Manufacturer application: Manufacturers of ZigBee
devices can use the ZigBee application profile or develop
their own application profile
20 March 2018 Unit 4 - IoT Protocols and Security 31
Network Layer
• Located between the MAC layer and application
support sublayer
• Provides the following functions:
• Starting a network
• Managing end devices joining or leaving a network
• Route discovery
• Neighbor discovery
20 March 2018 Unit 4 - IoT Protocols and Security 32
APS Layer
• Application Support Sublayer (APS)
• Provides services necessary for application objects
(endpoints) and the ZigBee device object (ZDO)
• Some of services provided by the APS to the
application objects for data transfer are
• Request
• Confirm
• Response
20 March 2018 Unit 4 - IoT Protocols and Security 33
APS Layer
• Application Object
(endpoint)
• Defines input and output
to the APS
• For example, a switch
that controls a light is the
input from the
application object, and
the output is the light
bulb condition
• Each node can have 240
separate application
objects
20 March 2018 Unit 4 - IoT Protocols and Security 34
APS Layer
• ZigBee Device Object (ZDO)
• Control and management of application objects
• Performs overall device management tasks:
• Determines the type of device in a network (for example, end
device, router, or coordinator)
• Initializes the APS, network layer, and security service provider
• Performs device and service discovery
• Initializes coordinator for establishing a network
• Security management
• Network management
20 March 2018 Unit 4 - IoT Protocols and Security 35
APS Layer
• End Node
• Each end node or end device can have multiple EPs
• Each EP contains an application profile, such as home
automation
• can be used to control multiple devices or single device
• ZigBee Addressing Mode
• ZigBee uses direct, group, and broadcast addressing for
transmission of information
20 March 2018 Unit 4 - IoT Protocols and Security 36
IOT Security
• Fundamental idea - IoT will connect all objects
around us to provide smooth communication
• Economic of scale in IoT presents new security
challenges for global devices in terms of
– Authentication
– Addressing
– Embedded Security
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
3
IOT Security
• Devices like RFID and sensor nodes have no
access control functionality
• Can freely obtain or exchange information
from each other
• So authentication & authorization scheme
must be established between these devices to
achieve the security goals for IoT
• Privacy of things and security of data is one of
the key challenges in the IoT
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
4
Vulnerabilities of IoT
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
5
Vulnerabilities of IoT
• Unauthorized Access
– One of the main threats is the tampering of
resources by unauthorized access
– Identity-based verification should be done before
granting the access rights
• Information corruption
– Device credential must be protected from tampering
– Secure design of access rights, credential and
exchange is required to avoid corruption
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
6
Vulnerabilities of IoT
• Theft of Resources
– Access of shared resources over insecure channel
causes theft of resources
– Results into man-in-the-middle attack
• Information Disclosure
– Data is stored at different places in different forms
– Distributed data must be protected from disclosure
– Context-aware access control must be enforced to
regulate access to system resources
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
7
Vulnerabilities of IoT
• DoS Attack
– Denial of Service (DoS)
– Makes an attempt to prevent authentic user from
accessing services which they are eligible for
– For example, unauthorized user sends to many
requests to server
– That flood the network and deny other authentic
users from access to the network
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
8
Vulnerabilities of IoT
• DDoS Attack
– Distributed Denial of Service
– Type of DoS attack where multiple compromised
systems are used to target single system causing DoS
– Compromised systems – usually infected with Trojan
– Victims of a DDoS attack consist of both
• End targeted systems
• All systems maliciously used and controlled by the hacker
in the distributed attack
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
9
Vulnerabilities of IoT
• CyberBunker Launches “World’s Largest”
DDoS Attack
• Slows down the Entire Internet
• CyberBunker - Dutch web hosting company
• Caused global disruption of the web
• Slowing down internet speeds for millions of
users across the world, according to BBC
report
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
10
Vulnerabilities of IoT
• Few real examples of attacks that hit the IoT:
– Carna Botnet – 4,20,000 ‘things,’ such as routers,
modems, printers were compromised
– TRENDnet’s connected cameras were hacked, with
feeds from those cameras published online
– Linux.Darlloz - PoC IoT worm found in the wild by
Symantec, 1,00,000 compromised systems
including connected things such as TVs, routers
and even a fridge
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
11
Security Requirements
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
12
Security
Requireme
nts
Access
Control
Authenti
cation
Data
Confiden
tiality
Availabili
ty
Trust
Manage
ment
Secure
Software
Executio
n
Secure
Storage
Tamper
Resistan
ce
Scalabilit
y
Flexibilit
y &
Adaptabi
lity
Security Requirements
• Access Control
– Provides authorized access to network resources
– IoT is ad-hoc, and dynamic in nature
– Efficient & robust mechanism of secure access to
resources must be deployed with distributed nature
• Authentication
– Identity establishment b/w communicating devices
– Due to diversity of devices & end users, an attack
resistant and lightweight solution for authentication
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
13
Security Requirements
• Data Confidentiality
– Protecting data from unauthorized disclosure
– Secure, lightweight, and efficient key exchange
mechanism is required
• Availability
– Ensuring no denial of authorized access to
network resources
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
14
Security Requirements
• Trust Management
– Decision rules needs to be evolved for trust
management in IoT
• Secure Software Execution
– Secure, managed-code, runtime environment
designed to protect against different applications
• Secure Storage
– Involves confidentiality and integrity of sensitive
information stored in the system
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
15
Security Requirements
• Tamper Resistance
– Desire to maintain security requirements even
when device falls into hands of malicious parties
– Can be physically or logically probed
• Scalability
– IoT consist of various types of devices with
different capabilities from intelligent sensors and
actuators, to home appliances
– Communication (wire or wireless) & protocols
(Bluetooth, ZigBee, RFID, Wi-Fi, etc.)
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
16
Security Requirements
• Flexibility and Adaptability
– IoT will consist of mobile communication devices
– Can roam around freely from one type of
environment to others
– With different type of risks and security threats
– So users are likely to have different privacy profile
depending on environment
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
17
Security Architecture for IoT
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
18
Threat Modeling
• Presented by first defining misuse case
• Means negative scenario describing the ways
the system should not work
• And then standard use case
• Assets to be protected in IoT will vary with
respect to every scenario case
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
19
Threat Analysis
• Assets needs to be identified to drive threat
analysis process
• Smart home is localized in space, provide
services in a household
• Devices in Smart Home are combined with n/w
• Provide means for entertainment, monitoring
of appliances, controlling of house components
and other services
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
20
Use Cases and Misuse Cases
• Actor in use case and misuse case in the
scenario of smart home includes:
– Infrastructure owner (smart home)
– IoT entity (smartphone device or software agent)
– Attacker (misuser)
– Intruder (exploiter)
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
21
Use Cases and Misuse Cases
• Access rights granted to unauthorized entity
• Corruption of access credentials
• Unauthorized data transmission
• Denial of service (DoS) attack
• Man-in-the-middle attack
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
22
IoT Security Tomography
• Classified according to attacks addressing to
different layers
– Transport Layer
– Network Layer
– MAC layer
– RF layer
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
23
IoT Security Tomography
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
24
Key Elements of Security
• Authentication
• Access Control
• Data and Message Security
• Prevention from denial of taking part in a
transaction
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
25
Identity Establishment
• Secure Entity Identification or Authentication
• Authentication is identity establishment
between communicating devices or entities
• Entity can be a single user, a set of users, an
entire organization or some networking device
• Identity establishment is ensuring that origin
of electronic document & message is correctly
identified
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
26
Access Control
• Also known as access authorization
• Principles is to determine who should be able
to access what
• Prevents unauthorized use of resources
• To achieve access control, entity which trying
to gain access must be authenticated first
• According to authentication, access rights can
be modified to the individual
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
27
Data and Message Security
• Related with source authenticity, modification
detection and confidentiality of data
• Combination of modification & confidentiality
of message is not enough for data integrity
• But origin of authenticity is also important
• Location privacy is equally important risk in IoT
• Should not be any way for attacker to reveal
identity or location information of device
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
28
Non-repudiation and Availability
• Non-repudiation is the security services for
point-to-point communications
• Process by which an entity is prevented from
denying a transmitted message
• So when message is sent, receiver can prove
that initiating sender only sent that message
• Sender can prove that receiver got message
• To repudiate means to deny
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
29
Non-repudiation and Availability
• Availability is ensured by maintaining all h/w,
repairing immediately whenever require
• Also prevents bottleneck occurrence by
keeping emergence backup power systems
• And guarding against malicious actions like
Denial of Service (DoS) attack
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
30
Security Model for IoT
March 16, 2018
Parag Achaliya, SNJB's CoE, Chandwad
(Nashik)
31

Contenu connexe

Tendances (20)

Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...
 
IOT DATA AND BIG DATA
IOT DATA AND BIG DATAIOT DATA AND BIG DATA
IOT DATA AND BIG DATA
 
Internet of things(IoT)
Internet of things(IoT)Internet of things(IoT)
Internet of things(IoT)
 
Iot
IotIot
Iot
 
IOT gateways.pptx
IOT gateways.pptxIOT gateways.pptx
IOT gateways.pptx
 
1. Introduction to IoT
1. Introduction to IoT1. Introduction to IoT
1. Introduction to IoT
 
Wot
WotWot
Wot
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IEEE 80211 ah
IEEE 80211 ahIEEE 80211 ah
IEEE 80211 ah
 
Module - 2 IOT PPT_ 18CS81.pdf
Module - 2 IOT PPT_ 18CS81.pdfModule - 2 IOT PPT_ 18CS81.pdf
Module - 2 IOT PPT_ 18CS81.pdf
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IOT PPT.pptx
IOT PPT.pptxIOT PPT.pptx
IOT PPT.pptx
 
Threat Modeling for IoT Systems
Threat Modeling for IoT SystemsThreat Modeling for IoT Systems
Threat Modeling for IoT Systems
 
nptel-1.pdf
nptel-1.pdfnptel-1.pdf
nptel-1.pdf
 
6LoWPAN
6LoWPAN 6LoWPAN
6LoWPAN
 
A Reference architecture for the Internet of things
A Reference architecture for the Internet of things A Reference architecture for the Internet of things
A Reference architecture for the Internet of things
 
The Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolutionThe Internet of Things (IoT) and its evolution
The Internet of Things (IoT) and its evolution
 

Similaire à unit 2.pdf

IOT_module_3.pdf
IOT_module_3.pdfIOT_module_3.pdf
IOT_module_3.pdfAmitH42
 
IoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdfIoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdfDanishMahmood23
 
DTT OIC, OIP IoT platform
DTT OIC, OIP IoT platformDTT OIC, OIP IoT platform
DTT OIC, OIP IoT platformNguyen Trung
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)milemadinah
 
Internet of Things: state of the art
Internet of Things: state of the artInternet of Things: state of the art
Internet of Things: state of the artMario Kušek
 
Internet of things
Internet of thingsInternet of things
Internet of thingsAli Nezhad
 
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...oneM2M
 
Introduction to Internet of Things.pdf
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdfGVNSK Sravya
 
Io t standardization jan2015 mg strategy
Io t standardization jan2015 mg strategyIo t standardization jan2015 mg strategy
Io t standardization jan2015 mg strategyMartin Gutberlet
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxssuser52b751
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
Advanced iot application training course
Advanced iot application training course Advanced iot application training course
Advanced iot application training course Bryan Len
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018Mario Drobics
 

Similaire à unit 2.pdf (20)

Unit 4
Unit 4Unit 4
Unit 4
 
IOT_module_3.pdf
IOT_module_3.pdfIOT_module_3.pdf
IOT_module_3.pdf
 
IoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdfIoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdf
 
DTT OIC, OIP IoT platform
DTT OIC, OIP IoT platformDTT OIC, OIP IoT platform
DTT OIC, OIP IoT platform
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Internet of Things: state of the art
Internet of Things: state of the artInternet of Things: state of the art
Internet of Things: state of the art
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
module 3.pptx
module 3.pptxmodule 3.pptx
module 3.pptx
 
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
 
intro to iot.pdf
intro to iot.pdfintro to iot.pdf
intro to iot.pdf
 
Introduction to Internet of Things.pdf
Introduction to Internet of Things.pdfIntroduction to Internet of Things.pdf
Introduction to Internet of Things.pdf
 
Io t standardization jan2015 mg strategy
Io t standardization jan2015 mg strategyIo t standardization jan2015 mg strategy
Io t standardization jan2015 mg strategy
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Advanced iot application training course
Advanced iot application training course Advanced iot application training course
Advanced iot application training course
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
ITET-4.pptx
ITET-4.pptxITET-4.pptx
ITET-4.pptx
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018
 
IOT tutorial
IOT tutorialIOT tutorial
IOT tutorial
 

Dernier

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Dernier (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 

unit 2.pdf

  • 1. Unit – 4 IoT Protocols and Security
  • 2. Protocol Standardization for IoT • IoT-Architecture one of the few efforts targeting a holistic architecture for all IoT sectors • This consortium consists of 17 European organizations from nine countries • Summarized current status of IoT standardization as • Fragmented architectures • No holistic approach to implement IoT has yet been proposed • Many island solutions do exist (RFID, sensor nets, etc.) • Little cross-sector reuse of technology and exchange of knowledge 20 March 2018 Unit 4 - IoT Protocols and Security 2
  • 3. M2M and WSN Protocols • Most M2M applications are developed today in a highly customized fashion • High-level M2M architecture from M2M Standardization Task Force (MSTF) does include fixed & other non cellular wireless networks • Means it’s generic, holistic IoT architecture even though it is M2M architecture • M2M and IoT sometimes are used interchangeably in the United States 20 March 2018 Unit 4 - IoT Protocols and Security 3
  • 4. M2M and WSN Protocols • Other M2M standards activities include: • Data transport protocol standards - M2MXML, JavaScript Object Notation (JSON), BiTXML, WMMP, MDMP • Extend OMA DM to support M2M devices protocol management objects • M2M device management, standardize M2M gateway • M2M security and fraud detection • Network API’s M2M service capabilities • Remote management of device behind gateway/firewall • Open REST-based API for M2M applications 20 March 2018 Unit 4 - IoT Protocols and Security 4
  • 5. SCADA and RFID Protocols • Supervisory Control And Data Acquisition • One of the IoT pillars to represent the whole industrial automation arena • IEEE created standard specification called Std C37.1™, for SCADA & automation systems in 2007 • In recent years, network-based industrial automation has greatly evolved • With the use of intelligent electronic devices (IEDs), or IoT devices in our terms, in substations and power stations 20 March 2018 Unit 4 - IoT Protocols and Security 5
  • 6. SCADA and RFID Protocols 20 March 2018 Unit 4 - IoT Protocols and Security 6
  • 7. SCADA and RFID Protocols • The processing is now distributed • Functions that used to be done at control center can now be done by IED i.e. M2M between devices • Due to restructuring of electric industry, traditional vertically integrated electric utilities are replaced by many entities such as • GENCO (Generation Company), • TRANSCO (Transmission Company), • DISCO (Distribution Company), • ISO (Independent System Operator), etc. 20 March 2018 Unit 4 - IoT Protocols and Security 7
  • 8. Issues with IoT Standardization • It should be noted that not everything about standardization is positive • Standardization is like a double-edged sword: • Critical to market development • But it may threaten innovation and inhibit change when standards are accepted by the market • Standardization and innovation are like yin & yang • They could be contradictory to each other in some cases, even though this observation is debatable 20 March 2018 Unit 4 - IoT Protocols and Security 8
  • 9. Issues with IoT Standardization • Different consortia, forums and alliances have been doing standardization in their own limited scope • For example, 3GPP covers only cellular wireless networks while EPCglobal’s middleware covers only RFID events • Even within same segment, there are more than one consortium or forum doing standardization without enough communication with each other • Some are even competing with each other 20 March 2018 Unit 4 - IoT Protocols and Security 9
  • 10. Issues with IoT Standardization • Some people believe that the IoT concept is well established • However, some gray zones remain in the definition, especially which technology should be included • Following two issues for IoT standardization in particular and ICT standardization in general may never have answers: 20 March 2018 Unit 4 - IoT Protocols and Security 10
  • 11. Issues with IoT Standardization 1. ICT standardization is a highly decentralized activity. How can the individual activities of the network of extremely heterogeneous standards- setting bodies be coordinated? 2. It will become essential to allow all interested stakeholders to participate in the standardization process toward the IoT and to voice their respective requirements and concerns. How can this be achieved? 20 March 2018 Unit 4 - IoT Protocols and Security 11
  • 12. Unified Data Standards • Already discussed about two pillars of the Internet • HTML/HTTP combination of data format and exchange protocol is the foundation pillar of WWW • Described great number of data standards and protocols proposed for four pillar domains of IoT • Many issues still impede the development of IoT and especially WoT vision 20 March 2018 Unit 4 - IoT Protocols and Security 12
  • 13. Unified Data Standards Evolution of web 20 March 2018 Unit 4 - IoT Protocols and Security 13
  • 14. Unified Data Standards • Many standardization efforts have been trying to define unified data representation, protocol for IoT • Before IoT, Internet was actually an Internet of documents or of multimedia documents • Two pillars of Internet including HTML/HTTP turned the Internet into WWW • We need to turn the IoT into the WoT • What will it take to make this to happen? 20 March 2018 Unit 4 - IoT Protocols and Security 14
  • 15. Unified Data Standards • Do we need a new HTML/HTTP-like standard for MTC and WoT? If there is no need to reinvent the wheel, what extensions do we need to build on top of HTML/HTTP or HTML5? • Browser is intended for humans, so do we need new browser for machines to make sense of ocean of machine-generated data? If not, what extensions do we need to make to the existing browsers? 20 March 2018 Unit 4 - IoT Protocols and Security 15
  • 16. Unified Data Standards • Today, most new protocols are built on top of XML. For OS there must be XML-based data format standards or a metadata standard to represent the machine-generated data (MGD). Is it possible to define such a metadata standard that covers everything? 20 March 2018 Unit 4 - IoT Protocols and Security 16
  • 17. Unified Data Standards • There are many different levels of protocols • But the ones that most directly relate to business and social issues are the ones closest to the top • so-called application protocols such as HTML/HTTP for the web • Web has always been visual medium, but restricted • Until recently, HTML developers were limited to CSS & JavaScript in order to produce animations • Or they would have to rely on a plug-in like Flash 20 March 2018 Unit 4 - IoT Protocols and Security 17
  • 18. Unified Data Standards 20 March 2018 Unit 4 - IoT Protocols and Security 18
  • 19. Protocols – IEEE 802.15.4 • Defines operation of low-rate wireless personal area networks (LR-WPANs) • Specifies physical layer and media access control for LR-WPANs • Maintained by IEEE 802.15 working group, which defined the standard in 2003 • Basic framework conceives a 10m communications range with a transfer rate of 250 kbit/s 20 March 2018 Unit 4 - IoT Protocols and Security 19
  • 20. Protocols – IEEE 802.15.4 20 March 2018 Unit 4 - IoT Protocols and Security 20 • Physical Layer (PHY) provides data transmission service & interface to physical layer management entity • MAC enables transmission of MAC frames through the use of the physical channel
  • 21. BACNet Protocol • Communications protocol for Building Automation and Control (BAC) networks • Provides mechanisms for computerized building automation devices to exchange information • Designed to allow communication of building automation & control system for application like • Heating, Ventilating and Air-conditioning Control (HVAC) • Lighting Control, Access Control • Fire Detection Systems and their Associated Equipment 20 March 2018 Unit 4 - IoT Protocols and Security 21
  • 22. BACNet Protocol • Defines a number of services that are used to communicate between building devices • Protocol services include Who-Is, I-Am, Who-Has, I- Have which are used for Device & Object discovery • Services such as Read-Property and Write-Property are used for data sharing • Defines 60 object types that are acted upon by services • Defines no. of data link/physical layers including 20 March 2018 Unit 4 - IoT Protocols and Security 22
  • 23. BACNet Protocol • ARCNET, • Ethernet, • BACnet/IP, • BACnet/IPv6, • Point-To-Point over RS-232, • Master-Slave/Token-Passing over RS-485, • ZigBee • LonTalk 20 March 2018 Unit 4 - IoT Protocols and Security 23
  • 24. Modbus • Serial communications protocol originally published by Modicon (now Schneider Electric) in 1979 • Commonly available for connecting industrial electronic devices • Reasons for use of Modbus in industrial environment: • Developed with industrial applications in mind • Openly published and royalty-free • Easy to deploy and maintain • Enables communication among many devices connected to the same network 20 March 2018 Unit 4 - IoT Protocols and Security 24
  • 25. Modbus Object Types 20 March 2018 Unit 4 - IoT Protocols and Security 25 Object type Access Size Coil Read-write 1 bit Discrete input Read-only 1 bit Input register Read-only 16 bits Holding register Read-write 16 bits
  • 26. Protocol Versions • Modbus RTU • Modbus ASCII • Modbus TCP/IP or Modbus TCP • Modbus over TCP/IP or Modbus over TCP or Modbus RTU/IP • Modbus over UDP • Modbus Plus (Modbus+, MB+ or MBP) • Pemex Modbus • Enron Modbus 20 March 2018 Unit 4 - IoT Protocols and Security 26
  • 27. KNX Protocol • Standardized (EN 50090, ISO/IEC 14543), OSI-based network communications protocol for automation • Defines several physical communication media: • Twisted pair wiring (inherited from the BatiBUS and EIB Instabus standards) • Powerline networking (inherited from EIB and EHS - similar to that used by X10) • Radio (KNX-RF) • Infrared • Ethernet (also known as EIBnet/IP or KNXnet/IP) 20 March 2018 Unit 4 - IoT Protocols and Security 27
  • 28. KNX System Components • All the devices for a KNX installation are connected together by a two wire bus to exchange data • Sensors • Actuators • System devices and components 20 March 2018 Unit 4 - IoT Protocols and Security 28
  • 29. ZigBee • IEEE 802.15.4-based specification for a suite of high-level communication protocols • Used to create personal area networks with small, low-power digital radios • ZigBee based applications • Home Automation • Medical Device Data Collection • other low-power low-bandwidth 20 March 2018 Unit 4 - IoT Protocols and Security 29
  • 30. ZigBee Architecture 20 March 2018 Unit 4 - IoT Protocols and Security 30
  • 31. ZigBee Architecture • Divided into three sections • IEEE 802.15.4 which consists of MAC and physical layers • ZigBee layers, which consist of the network layer, the ZigBee device object (ZDO), the application sublayer, and security management • Manufacturer application: Manufacturers of ZigBee devices can use the ZigBee application profile or develop their own application profile 20 March 2018 Unit 4 - IoT Protocols and Security 31
  • 32. Network Layer • Located between the MAC layer and application support sublayer • Provides the following functions: • Starting a network • Managing end devices joining or leaving a network • Route discovery • Neighbor discovery 20 March 2018 Unit 4 - IoT Protocols and Security 32
  • 33. APS Layer • Application Support Sublayer (APS) • Provides services necessary for application objects (endpoints) and the ZigBee device object (ZDO) • Some of services provided by the APS to the application objects for data transfer are • Request • Confirm • Response 20 March 2018 Unit 4 - IoT Protocols and Security 33
  • 34. APS Layer • Application Object (endpoint) • Defines input and output to the APS • For example, a switch that controls a light is the input from the application object, and the output is the light bulb condition • Each node can have 240 separate application objects 20 March 2018 Unit 4 - IoT Protocols and Security 34
  • 35. APS Layer • ZigBee Device Object (ZDO) • Control and management of application objects • Performs overall device management tasks: • Determines the type of device in a network (for example, end device, router, or coordinator) • Initializes the APS, network layer, and security service provider • Performs device and service discovery • Initializes coordinator for establishing a network • Security management • Network management 20 March 2018 Unit 4 - IoT Protocols and Security 35
  • 36. APS Layer • End Node • Each end node or end device can have multiple EPs • Each EP contains an application profile, such as home automation • can be used to control multiple devices or single device • ZigBee Addressing Mode • ZigBee uses direct, group, and broadcast addressing for transmission of information 20 March 2018 Unit 4 - IoT Protocols and Security 36
  • 37. IOT Security • Fundamental idea - IoT will connect all objects around us to provide smooth communication • Economic of scale in IoT presents new security challenges for global devices in terms of – Authentication – Addressing – Embedded Security March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 3
  • 38. IOT Security • Devices like RFID and sensor nodes have no access control functionality • Can freely obtain or exchange information from each other • So authentication & authorization scheme must be established between these devices to achieve the security goals for IoT • Privacy of things and security of data is one of the key challenges in the IoT March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 4
  • 39. Vulnerabilities of IoT March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 5
  • 40. Vulnerabilities of IoT • Unauthorized Access – One of the main threats is the tampering of resources by unauthorized access – Identity-based verification should be done before granting the access rights • Information corruption – Device credential must be protected from tampering – Secure design of access rights, credential and exchange is required to avoid corruption March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 6
  • 41. Vulnerabilities of IoT • Theft of Resources – Access of shared resources over insecure channel causes theft of resources – Results into man-in-the-middle attack • Information Disclosure – Data is stored at different places in different forms – Distributed data must be protected from disclosure – Context-aware access control must be enforced to regulate access to system resources March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 7
  • 42. Vulnerabilities of IoT • DoS Attack – Denial of Service (DoS) – Makes an attempt to prevent authentic user from accessing services which they are eligible for – For example, unauthorized user sends to many requests to server – That flood the network and deny other authentic users from access to the network March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 8
  • 43. Vulnerabilities of IoT • DDoS Attack – Distributed Denial of Service – Type of DoS attack where multiple compromised systems are used to target single system causing DoS – Compromised systems – usually infected with Trojan – Victims of a DDoS attack consist of both • End targeted systems • All systems maliciously used and controlled by the hacker in the distributed attack March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 9
  • 44. Vulnerabilities of IoT • CyberBunker Launches “World’s Largest” DDoS Attack • Slows down the Entire Internet • CyberBunker - Dutch web hosting company • Caused global disruption of the web • Slowing down internet speeds for millions of users across the world, according to BBC report March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 10
  • 45. Vulnerabilities of IoT • Few real examples of attacks that hit the IoT: – Carna Botnet – 4,20,000 ‘things,’ such as routers, modems, printers were compromised – TRENDnet’s connected cameras were hacked, with feeds from those cameras published online – Linux.Darlloz - PoC IoT worm found in the wild by Symantec, 1,00,000 compromised systems including connected things such as TVs, routers and even a fridge March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 11
  • 46. Security Requirements March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 12 Security Requireme nts Access Control Authenti cation Data Confiden tiality Availabili ty Trust Manage ment Secure Software Executio n Secure Storage Tamper Resistan ce Scalabilit y Flexibilit y & Adaptabi lity
  • 47. Security Requirements • Access Control – Provides authorized access to network resources – IoT is ad-hoc, and dynamic in nature – Efficient & robust mechanism of secure access to resources must be deployed with distributed nature • Authentication – Identity establishment b/w communicating devices – Due to diversity of devices & end users, an attack resistant and lightweight solution for authentication March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 13
  • 48. Security Requirements • Data Confidentiality – Protecting data from unauthorized disclosure – Secure, lightweight, and efficient key exchange mechanism is required • Availability – Ensuring no denial of authorized access to network resources March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 14
  • 49. Security Requirements • Trust Management – Decision rules needs to be evolved for trust management in IoT • Secure Software Execution – Secure, managed-code, runtime environment designed to protect against different applications • Secure Storage – Involves confidentiality and integrity of sensitive information stored in the system March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 15
  • 50. Security Requirements • Tamper Resistance – Desire to maintain security requirements even when device falls into hands of malicious parties – Can be physically or logically probed • Scalability – IoT consist of various types of devices with different capabilities from intelligent sensors and actuators, to home appliances – Communication (wire or wireless) & protocols (Bluetooth, ZigBee, RFID, Wi-Fi, etc.) March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 16
  • 51. Security Requirements • Flexibility and Adaptability – IoT will consist of mobile communication devices – Can roam around freely from one type of environment to others – With different type of risks and security threats – So users are likely to have different privacy profile depending on environment March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 17
  • 52. Security Architecture for IoT March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 18
  • 53. Threat Modeling • Presented by first defining misuse case • Means negative scenario describing the ways the system should not work • And then standard use case • Assets to be protected in IoT will vary with respect to every scenario case March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 19
  • 54. Threat Analysis • Assets needs to be identified to drive threat analysis process • Smart home is localized in space, provide services in a household • Devices in Smart Home are combined with n/w • Provide means for entertainment, monitoring of appliances, controlling of house components and other services March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 20
  • 55. Use Cases and Misuse Cases • Actor in use case and misuse case in the scenario of smart home includes: – Infrastructure owner (smart home) – IoT entity (smartphone device or software agent) – Attacker (misuser) – Intruder (exploiter) March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 21
  • 56. Use Cases and Misuse Cases • Access rights granted to unauthorized entity • Corruption of access credentials • Unauthorized data transmission • Denial of service (DoS) attack • Man-in-the-middle attack March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 22
  • 57. IoT Security Tomography • Classified according to attacks addressing to different layers – Transport Layer – Network Layer – MAC layer – RF layer March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 23
  • 58. IoT Security Tomography March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 24
  • 59. Key Elements of Security • Authentication • Access Control • Data and Message Security • Prevention from denial of taking part in a transaction March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 25
  • 60. Identity Establishment • Secure Entity Identification or Authentication • Authentication is identity establishment between communicating devices or entities • Entity can be a single user, a set of users, an entire organization or some networking device • Identity establishment is ensuring that origin of electronic document & message is correctly identified March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 26
  • 61. Access Control • Also known as access authorization • Principles is to determine who should be able to access what • Prevents unauthorized use of resources • To achieve access control, entity which trying to gain access must be authenticated first • According to authentication, access rights can be modified to the individual March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 27
  • 62. Data and Message Security • Related with source authenticity, modification detection and confidentiality of data • Combination of modification & confidentiality of message is not enough for data integrity • But origin of authenticity is also important • Location privacy is equally important risk in IoT • Should not be any way for attacker to reveal identity or location information of device March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 28
  • 63. Non-repudiation and Availability • Non-repudiation is the security services for point-to-point communications • Process by which an entity is prevented from denying a transmitted message • So when message is sent, receiver can prove that initiating sender only sent that message • Sender can prove that receiver got message • To repudiate means to deny March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 29
  • 64. Non-repudiation and Availability • Availability is ensured by maintaining all h/w, repairing immediately whenever require • Also prevents bottleneck occurrence by keeping emergence backup power systems • And guarding against malicious actions like Denial of Service (DoS) attack March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 30
  • 65. Security Model for IoT March 16, 2018 Parag Achaliya, SNJB's CoE, Chandwad (Nashik) 31