You are on page 1of 9

IoT Attacks And

Countermeasures
Presented By:
Hafiz Tahir Idrees
MS-IS (Spring 2019)
IoT – An Introduction
Smart devices that communicate with each other

Enables these devices to collect and exchange data

Wide range of life applications such as industry, transportation, logistics,


healthcare, smart environment.
Layered Architecture of IoT
Perception Layer

Network layer

Middle-ware layer

Application layer
Layers Overview
Perception Layer
Identification of the unique objects and dealing with its collected data
obtained

Network Layer
Transmission of gathered information to processing system via network
Continues…
Middle-ware layer
Information processing systems taking automated actions based on the
results of processed data

Application layer
Realization of various practical applications of IoT based on the needs of
users and different kinds of industries
Objectives of Study
Security threat analysis

Study of Security principles adopted

Knowledge of technological challenges faced


Motivation
Information and data security is most important in IoT

Learning and deployments of fool proof mechanisms of security

Study of layered architecture of the IoT framework


Research Guideline Material
Following is the material reviewed yet so far:
A Critical Analysis on the Security Concerns of Internet of Things (IoT)
International Journal of Computer Applications (0975 8887) Volume 111 - No. 7, February
2015 (Impact Factor 2.2)

Internet of Things (IoT) Security: Current Status, Challenges and Prospective Measures
The 10th International Conference for Internet Technology and Secured Transactions
(ICITST-2015) (Ranking – 4)
Continues…
Internet of Things: Survey on Security and Privacy

IoT Security: A Layered Approach for Attacks & Defenses

You might also like