IOT hacking an dusage aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa .pptx

PratikYadav733137 37 views 26 slides Sep 19, 2024
Slide 1
Slide 1 of 26
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26

About This Presentation

iot basic ss


Slide Content

IOT(Internet Of Things)

The Internet of Things ( IoT ) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that  are  provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. What is IOT?

ELEMENTS OF IoT INFRASTRUCTURE

Steps that Contribute in forming a strong IoT architecture 1.Drivers :Iot Networks have characteristics that are unique from the traditional network architectures adopted by IT World. 2.Comparison among IoT Architectures : While designing a network design for IoT, comparing th e features and functionalities provided by the already existing architectures is essential to build a stronger & better architecture. 3 . Simplified Architectures: It all Begins with a Simplified version what’s yet to come. 4.Core Functional Stack : This step comprises of an overview of the entire networking stack including the application layer and sensors. 5.Computation and dat a Management of Stack : Data Management solutions along with resources models like that of cloud computing, are included in this phase. IoT Network Architecture & Design

Architecture of Internet Of Things

Embedded sensor Architecture

IoT AND THE THREE C’S

First c denotes the communication aspect of IoT. In this smart device make daily data effortlessly available to us from modest step counting to something as intricate as our eating or sleeping COMMUNICATION

As humans we see things from a totally different aspect and as engineers; we tend to see products from an exact view-point. In the world of IoT, all of the mechanism must collaborate flawlessly to make the machine function correctly. Apart from this, taking the time to understand the needs of the other members of the design community helps the joint technological progression. Control and Automation

IoT can aid a company to save money by abating equipment failure and letting the business to active planned upkeep. The measuring items, such as driving behavior and speed can also reduce fuel expenses and wear and tear on consumables. There are various equipment’s that are used in home and companies through which users can save data and thus help in understanding people the concepts of energy consumption and opportunities for cost savings. Cost Savings

COMMUNICATION CHANNELS

Wi-Fi connectivity is one of the most important choices for many developers, mainly due to the pervasiveness of Wi-Fi in the home network environment. A series of RF development kits designed for building Wi-Fi based applications are available in the market a)Standard: Based on 802.11n b)Frequencies: 2.4GHz and 5GHz bands c)Range: Approximately 300m d)Data Rates: 600 Mbps maximum, but 150-200Mbps is more typical, depending on channel frequency WIFI

Bluetooth is one of the most important short-range communication technologies. It still is very important in computing and many consumer product markets. It is excepted to be the key for wearable products in particular. Some of the key features of Bluetooth with low energy include: a)Standard : Bluetooth 4.2 core specification b)Frequency: 2.4GHz (ISM) c )Range: 50-150m (Smart/BLE) d)Data Rates: 1Mbps (Smart/BLE) BLUETOOTH

Any IoT applications that requires operation over longer distances can take advantage of GSM/3G/4G cellular communication capabilities. A key product in this area is a theSpargEE range of products, including the original tiny CELLv1.0 low-cost development board and a series of shield connecting boards for use with the Rasberry Pi and Arduino platforms. a)Standard: GSM/GPRS/EDGE (2G), UMTS/HSPA (3G), LTE(4G) b)Frequencies: 900/1800/1900/2100MHz c)Range: 35km max for GSM; 200km max for HSPA d)Data Rates (typical download): 35-170kbps (GPRS), 120-384kbps (EDGE), 384kbps-2Mbps (UMTS), 600kbps-10Mbps (HSPA), 3-10Mbps (LTE) CELLULAR

ZigBee, like Bluetooth, has a large installed base of operation, although perhaps traditionally more in industrial settings. Zigbee PRO and ZigBee Remote Control(RE4CE), among other available ZigBee profiles, are based on the IEEE802.15.4 protocol. ZigBee wireless standards into a single standard: 1.Standard: ZigBee 3.0 based on IEEE802.15.4 2.Frequency :2.4GHz 3.Range:10-100m 4.Data Rates:250kbps Zigbee

Z-Wave is a low-power RF communications technology that is primarily designed for home automation for products such as lamp controllers and sensors among many others. Optimized for reliable and low-latency communication of small data packets with data rates up to 100kbit/s, it operates in the sub-1GHz band and is impervious to interference fro m WiFi and other wireless technologies in the 2.4GHz range such as Bluetooth or Zigbee. Sources of ZWave are: a)Standard: Z-Wave Alliance ZAD12837/ITU-T G.9959 b)Frequency:900MHz (ISM) c)Range:30m d)Data Rates:9.6/40/100kbit/s ZWave

A key IP-based technology is 6LowPAN. Rather than being an IoT application protocols technology like Bluetooth or ZigBee, 6LowPAN is a network protocol that defines encapsulation and header compression mechanisms. Sources of 6LowPAN are: a)Standard:RFC6282 b)Frequency : adapted and used over a variety of other networking media including Bluetooth Smart(2.4GHz) or ZigBee or low-power RF(sub-1GHz) c)Range: N/A d)Data Rates: N/A 6LoWPAN

IOT Attack Surface Areas

IoT Attack Surface Areas

Common Vulnerabilities in IoT Devices

List of Common Vulnerabilities in IoT Devices 1.User Enumeration 13.Firmware Version Display 2.Weak Passwords 14.Firmware and Storage Extraction 3.Account Lockout 15.Manipulating the code execution flow 4.Uencrypted Services 16.Obtaining console access 5.Two-Factor Authentication 6.Poorly Implemented Encryption 7.Update sent without encryption 8.Update location writable 9.Denail of service 10.Removal of storage media 11.No manual update mechanism 12.Missing Update Mechanism Common Vulnerabilities in IoT Devices

SECURING IOT

1.Cryptographic Solution 2.Security Features IoT Protocols >SSL/TLS >On Application layer of IoT 3.Security Management >IAM(Identity and Access Management) >Key Management SECURING IOT

USES OF IOT

1.Home Automation 2.Agriculture 3.Retail 4.HealthCare 5.Smart Grids 6.Smart Cities USES OF IOT

THANK YOU
Tags