INTERNET OF THINGS
2 LEARNING OUTCOMES
Explain about characteristic of IoT
Differentiate between M2M and IoT
Explain several examples of application of IoT
Identify IoT technologies
Identify challenges in IoT
3
INTRODUCTION TO IOT
Kupat Tahu Presentation
4
What is IoT
Network of Physical Objects
Internet of Things (IoT) comprises things that have unique identities and are
connected to the Internet
The focus on IoT is in the configuration, control and networking via the Internet
of devices or “Things” that are traditionally not associated with the internet
Eg: pump, utility meter, car engine
IoT is a new revolution in the capabilities of the endpoints that are connected to
the internet
5
What is IoT
Network of Physical Objects
The Scope of IoT is not limited to just connecting things (device, appliances,
machines) to the Internet
IoT allows these things to communicate and exchange data (control&
information)
Processing on these data will provide us various applications towards a common
user or machine goal
Idea: Move from Internet of People Internet of Things 6
Internet appears everywhere in the world Internet of Things is a plan to connect things also
It is primarily connection between people using the same medium
Internet of Things - Evolution 7
8
Difference between M2M and IoT 9
10 IOT: People connecting with Things
ECG sensor
Internet
Motion sensor
Motion sensor
Motion sensor
11 IoT: Things connecting with Things
- Complex and heterogeneous
resources and networks
12 Unlocking the Massive potential of IoT
13 Looming Opportunity
14
APPLICATIONS OF IOT
15 IoT Applications : Intelligent Home
16 Smart home
Information Security
Office of Budget and Finance
Education – Partnership – Solutions
18
19
20
21
22
23
24
25
26
27 IoT Applications : Transportation
28
Supply Chain Management
Logistic
Product Design
Warehouse
Manufacturing
29 IoT Architecture
Integrated Application Smart Grid Green Building Smart Transport Env. Monitor
Information Processing Data Center Search Engine Smart Decision Info. Security Data Mining
WWAN WMAN
Network Construction
Internet
WPAN WLAN
Sensing & Identification GPS Smart Device RFID Sensor Sensor
30
IOT TECHNOLOGIES
Kupat Tahu Presentation
IoT Technologies 31
Hardware (Device)
Communication Technology
Protocols for IoT
Software (IDE)
Cloud Platforms
32
Challenges of IoT
Connectivity
Power Management
Security
Rapid Evolution
https://www.youtube.com/watch?v=z72G4WXQ_IY
Security :Why be concerned about IoT?
It’s just another computer, right?
• All of the same issues we have with access
control, vulnerability management, patching,
monitoring, etc.
• Imagine your network with 1,000,000 more
devices
• Any compromised device is a foothold on the
network
Does IoT add additional risk?
• Are highly portable devices captured during vulnerability scans?
• Where is your network perimeter?
• Are consumer devices being used in areas – like health care – where
reliability is critical?
• Do users install device management software on other computers? Is
that another attack vector?
Attacking IoT
• Default, weak, and hardcoded credentials
• Difficult to update firmware and OS
• Lack of vendor support for repairing vulnerabilities
• Vulnerable web interfaces (SQL injection, XSS)
• Coding errors (buffer overflow)
• Clear text protocols and unnecessary open ports
• DoS / DDoS
• Physical theft and tampering
Case Study: Trane
• Connected thermostat vulnerabilities detected by Cisco’s Talos group allowed
foothold into network
• 12 months to publish fixes for 2 vulnerabilities
• 21 months to publish fix for 1 vulnerability
• Device owners may not be aware of fixes, or have the skill to install updates
Case Study: Lessons Learned
• All software can contain vulnerabilities
• Public not informed for months
• Vendors may delay or ignore issues
• Product lifecycles and end-of-support
• Patching IoT devices may not scale in large environments
Recommendations
Accommodate IoT with existing practices:
• Policies, Procedures, & Standards
• Awareness Training
• Risk Management
• Vulnerability Management
• Forensics
Recommendations
• Strengthen partnerships with researchers,
vendors, and procurement department
Threat vs. Opportunity
• If misunderstood and misconfigured, IoT poses risk to our
data, privacy, and safety
• If understood and secured, IoT will enhance
communications, lifestyle, and delivery of services
41
Thank you !
42
Source
www.kayarvizhy.com
www.utdallas.edu/infosecurity