IoT GTU Study Material Presentations Unit-7 07062021082654AM
IoT GTU Study Material Presentations Unit-7 07062021082654AM
GTU # 3160716
Unit-7
IoT Security
Software
protect it even while updating patch.
Massage channels during the paring stage need Data
Ne
Hard
tw
ork
An appropriate protocol should be followed while
ing
connecting the user and device.
An authentication process is needed when the
controller linking to a port in local network. Multidimensional Prospective of IoT Security
Software
cloud services are used for
authentication. multidimensional Data
Ne
Hard
Abnormal behavior should be
tw
ork
monitored like too many login attempts
ing
Multidimensional Prospective of IoT Security
Network Security
Authentication
Management
Support Layer Cloud and Smart Computing
Privacy
Undeniability Internet Portable
IoT will be needed extra Network Layer Communication Network and
Communication Protocols
care for advanced
security and privacy Perceptual Layer RFID Reader, Sensors and GPS
across critical areas.
Application Layer
A dependable platform for the application
layer.
Grid and cloud computing are mostly used for
all kinds of intelligent computing powers.
Support Layer
This layers helps merge the application layer
upward and the network layer downward.
Network Layer
Application Layer
This layer delivers the personalized services
based on the users’ need.
Perceptual Layer
It helps users access IoT through the interface
using personal computer, mobile equipment,
etc.
Encryption
Encryption play key role in the security, but many
devices cannot perform the complex encryption
and decryption quickly because of limited
resource.
Products with constrained resources are most
likely to attacks.
Reverse engineering of algorithm is possible on it.
Communication Channel
The communication channel needs to be secure as well
Encrypting messages before transfer is good but it is better to use
transport encryption and to adopt standards like TLS.