IoT Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

What is IoT

  • internet of things

  • refers to the expanding interconnection of smart devices

2
New cards

Evolution of IoT

  1. Information Technology: PCs, servers, routers, etc.

  2. Operational technology: machines/appliances with embedded IT

  3. Personal Tech: smartphones, tablets

  4. Sensor/actuator technology: single-purpose devices, exclusively wireless connectivity

3
New cards

CE-IoT

  • integration of the cloud and IoT

  • major cloud service providers utilize their cloud infrastructure to provide IoT solutions

  • primary concerns are privacy and security for IoT

4
New cards

Fog

  • processes data near the source sensors instead of centralized storage

  • reduces latency and enhances data management and analysis capability

5
New cards

Goals of Edge Computing for IoT

  • data security and privacy

  • reduce latency and operating costs

  • Improve response rate and business efficiency

  • scalability

6
New cards

Core

  • connects geographically dispersed fog networks and provides access to other networks not apart of the enterprise

  • uses high-performance routers

7
New cards

Digital Twin

  • virtual representation of IoT entities

8
New cards

Gateway Security

  • interconnects the IoT-enabled devices with higher-level communication networks

  • preforms necessary translation between communication network protocols and those used by devices

9
New cards

IoT Security and Privacy Requirements

  • communication, data management, and service provision security

  • integration of security policies

  • mutual authentication and authorization

  • security audits

10
New cards

Patching Vulnerability

  • numerous embedded devices have security flaws

  • many devices lack proper methods of patching

  • unpatched devices are vulnerable to attacks

11
New cards

IoT Application Domains

  • healthcare

  • retail

  • cities

12
New cards

IoT Use Cases

  • smart home

  • smart agriculture

13
New cards

IoT Security Challenges

  • resource-constrained devices

  • remote deployment and locations

  • heterogeneity of IoT devices

  • lack of standards/regulations

  • authentication/authorization

14
New cards

MQTT

  • message queuing telemetry transport

  • suitable for constrained devices

  • utilizes a publish/subscribe model

  • supports authentication and secure connections via SSL/TLS

15
New cards

CoAP

  • constrained application protocol

  • specialized for M2M applications

  • utilizes UDP, asynchronous transactions, and can easily interface with HTTP