You are on page 1of 42

INTERNET OF THINGS

2 LEARNING OUTCOMES

Explain about characteristic of IoT


Differentiate between M2M and IoT
Explain several examples of application of IoT
Identify IoT technologies
Identify challenges in IoT
3

INTRODUCTION TO IOT

Kupat Tahu Presentation


4

What is IoT
Network of Physical Objects

Internet of Things (IoT) comprises things that have unique identities and are
connected to the Internet

The focus on IoT is in the configuration, control and networking via the Internet
of devices or “Things” that are traditionally not associated with the internet
Eg: pump, utility meter, car engine

IoT is a new revolution in the capabilities of the endpoints that are connected to
the internet
5

What is IoT
Network of Physical Objects

The Scope of IoT is not limited to just connecting things (device, appliances,
machines) to the Internet

IoT allows these things to communicate and exchange data (control&


information)

Processing on these data will provide us various applications towards a common


user or machine goal
Idea: Move from Internet of People  Internet of Things 6

Internet appears everywhere in the world  Internet of Things is a plan to connect things also
 It is primarily connection between people using the same medium
Internet of Things - Evolution 7
8
Difference between M2M and IoT 9
10 IOT: People connecting with Things

ECG sensor

Internet

Motion sensor

Motion sensor
Motion sensor
11 IoT: Things connecting with Things

- Complex and heterogeneous


resources and networks
12 Unlocking the Massive potential of IoT
13 Looming Opportunity
14

APPLICATIONS OF IOT
15 IoT Applications : Intelligent Home
16 Smart home
Information Security
Office of Budget and Finance
Education – Partnership – Solutions
18
19
20
21
22
23
24
25
26
27 IoT Applications : Transportation
28
Supply Chain Management

Logistic

Product Design

Warehouse

Manufacturing
29 IoT Architecture

Integrated Application Smart Grid Green Building Smart Transport Env. Monitor

Information Processing Data Center Search Engine Smart Decision Info. Security Data Mining

WWAN WMAN

Network Construction
Internet
WPAN WLAN

Sensing & Identification GPS Smart Device RFID Sensor Sensor


30

IOT TECHNOLOGIES

Kupat Tahu Presentation


IoT Technologies 31

Hardware (Device)

Communication Technology

Protocols for IoT

Software (IDE)

Cloud Platforms
32

Challenges of IoT
Connectivity

Power Management

Security

Rapid Evolution
https://www.youtube.com/watch?v=z72G4WXQ_IY

Security :Why be concerned about IoT?

It’s just another computer, right?


• All of the same issues we have with access
control, vulnerability management, patching,
monitoring, etc.
• Imagine your network with 1,000,000 more
devices
• Any compromised device is a foothold on the
network
Does IoT add additional risk?
• Are highly portable devices captured during vulnerability scans?

• Where is your network perimeter?

• Are consumer devices being used in areas – like health care – where
reliability is critical?

• Do users install device management software on other computers? Is


that another attack vector?
Attacking IoT
• Default, weak, and hardcoded credentials
• Difficult to update firmware and OS
• Lack of vendor support for repairing vulnerabilities
• Vulnerable web interfaces (SQL injection, XSS)
• Coding errors (buffer overflow)
• Clear text protocols and unnecessary open ports
• DoS / DDoS
• Physical theft and tampering
Case Study: Trane

• Connected thermostat vulnerabilities detected by Cisco’s Talos group allowed


foothold into network
• 12 months to publish fixes for 2 vulnerabilities
• 21 months to publish fix for 1 vulnerability
• Device owners may not be aware of fixes, or have the skill to install updates
Case Study: Lessons Learned

• All software can contain vulnerabilities

• Public not informed for months

• Vendors may delay or ignore issues

• Product lifecycles and end-of-support

• Patching IoT devices may not scale in large environments


Recommendations

Accommodate IoT with existing practices:


• Policies, Procedures, & Standards

• Awareness Training

• Risk Management

• Vulnerability Management

• Forensics
Recommendations

• Strengthen partnerships with researchers,


vendors, and procurement department
Threat vs. Opportunity

• If misunderstood and misconfigured, IoT poses risk to our


data, privacy, and safety

• If understood and secured, IoT will enhance


communications, lifestyle, and delivery of services
41

Thank you !
42

Source

www.kayarvizhy.com

www.utdallas.edu/infosecurity

You might also like