1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is IoT
internet of things
refers to the expanding interconnection of smart devices
Evolution of IoT
Information Technology: PCs, servers, routers, etc.
Operational technology: machines/appliances with embedded IT
Personal Tech: smartphones, tablets
Sensor/actuator technology: single-purpose devices, exclusively wireless connectivity
CE-IoT
integration of the cloud and IoT
major cloud service providers utilize their cloud infrastructure to provide IoT solutions
primary concerns are privacy and security for IoT
Fog
processes data near the source sensors instead of centralized storage
reduces latency and enhances data management and analysis capability
Goals of Edge Computing for IoT
data security and privacy
reduce latency and operating costs
Improve response rate and business efficiency
scalability
Core
connects geographically dispersed fog networks and provides access to other networks not apart of the enterprise
uses high-performance routers
Digital Twin
virtual representation of IoT entities
Gateway Security
interconnects the IoT-enabled devices with higher-level communication networks
preforms necessary translation between communication network protocols and those used by devices
IoT Security and Privacy Requirements
communication, data management, and service provision security
integration of security policies
mutual authentication and authorization
security audits
Patching Vulnerability
numerous embedded devices have security flaws
many devices lack proper methods of patching
unpatched devices are vulnerable to attacks
IoT Application Domains
healthcare
retail
cities
IoT Use Cases
smart home
smart agriculture
IoT Security Challenges
resource-constrained devices
remote deployment and locations
heterogeneity of IoT devices
lack of standards/regulations
authentication/authorization
MQTT
message queuing telemetry transport
suitable for constrained devices
utilizes a publish/subscribe model
supports authentication and secure connections via SSL/TLS
CoAP
constrained application protocol
specialized for M2M applications
utilizes UDP, asynchronous transactions, and can easily interface with HTTP