Chapter 9 - IoT Flashcards
What is IoT ?
A collection of devices using sensors, software, storage and electronics to collect, analyze, store and share data.
What are the 3 components of IoT ?
Sensing Technology, IoT gateways, The Cloud
Vehicle Ad Hoc Network (VANET)
Communications networks used by our vehicles. Allows for Vehicle- to-vehicle data exchange (V2V)
IoT OS - RIOT OS
It can run on embedded systems, actuator boards, and sensors, uses energy efficiently, and has very small resource requirements
IoT OS - ARM Mbed OS
This is mostly used on wearables and other devices that are low-powered.
IoT OS - RealSense OS X
Intel’s depth sensing version, this is mostly found in cameras and other sensors
IoT OS - Nucleus RTOS
This is primarily used in aerospace, medical, and industrial applications.
IoT OS - Brillo
An Android-based OS, this is generally found in thermostats
IoT OS - Contiki
This is another OS madefor low-power devices; however, it is found mostly in street lighting and sound monitoring
IoT OS - Zephyr
This is another option for low powered devices and devices without many resources
IoT OS - Ubuntu Core
This is used in robots and drones, and is also known as “snappy”
IoT OS - Integrity RTOS
This is primarily found in aerospace and medical, defense, industrial, and automotive sectors
IoT OS - Apache Mynewt
Devices using Bluetooth Low Energy Protocol make use of this
IoT Methods for Communicating
Device to Device (IoT to IoT) - Device to Cloud (Directly to cloud) - Device to Gateway (Gateway first then cloud) - Back-End Data Sharing (Device to cloud, but adds parties to collect data).
IoT Architecture - Edge Technology Layer
Consists of sensors, RFID tags, readers and the devices
IoT Architecture - Access Gateway Layer
First data handling, message identification and routing
IoT Architecture - Internet Layer
Crucial layer which serves as main component to allow communication
IoT Architecture - Middleware Layer
Sits between application and hardware; handles data and device management, data analysis and aggregation.
IoT Architecture - Application Layer
Responsible for delivery of services and data to the user
IoT Attack - Sybil Attack
Uses multiple forged identities to create the illusion of traffic
IoT Attack - HVAC Attacks
attacks on HVAC systems
IoT Attack - Rolling Code
The ability to jam a key fob’s communications, steal the code and then create a subsequent code.
IoT Attack - BlueBorne
Attacks against Bluetooth devices
What is the IoT Hacking Methodology ?
- Information Gathering 2. Vulnerability Scanning. 3. Launch Attacks 4. Gaining Access. 5. Maintaining Access
Foren6
Tool for IoT traffic sniffing
RIoT
IoT Vuln scanner
beSTORM
Vulnerability scanner
IoTsploit
IoT Vuln scanner
IoT Inspector
IoT Vuln scanner
Firmalyzer
IoT Attack tool
KillerBee
IoT Attack tool
JTAGulator
IoT Attack tool
Attify
IoT Attack tool