Chapter 9 - IoT Flashcards
What is IoT ?
A collection of devices using sensors, software, storage and electronics to collect, analyze, store and share data.
What are the 3 components of IoT ?
Sensing Technology, IoT gateways, The Cloud
Vehicle Ad Hoc Network (VANET)
Communications networks used by our vehicles. Allows for Vehicle- to-vehicle data exchange (V2V)
IoT OS - RIOT OS
It can run on embedded systems, actuator boards, and sensors, uses energy efficiently, and has very small resource requirements
IoT OS - ARM Mbed OS
This is mostly used on wearables and other devices that are low-powered.
IoT OS - RealSense OS X
Intel’s depth sensing version, this is mostly found in cameras and other sensors
IoT OS - Nucleus RTOS
This is primarily used in aerospace, medical, and industrial applications.
IoT OS - Brillo
An Android-based OS, this is generally found in thermostats
IoT OS - Contiki
This is another OS madefor low-power devices; however, it is found mostly in street lighting and sound monitoring
IoT OS - Zephyr
This is another option for low powered devices and devices without many resources
IoT OS - Ubuntu Core
This is used in robots and drones, and is also known as “snappy”
IoT OS - Integrity RTOS
This is primarily found in aerospace and medical, defense, industrial, and automotive sectors
IoT OS - Apache Mynewt
Devices using Bluetooth Low Energy Protocol make use of this
IoT Methods for Communicating
Device to Device (IoT to IoT) - Device to Cloud (Directly to cloud) - Device to Gateway (Gateway first then cloud) - Back-End Data Sharing (Device to cloud, but adds parties to collect data).
IoT Architecture - Edge Technology Layer
Consists of sensors, RFID tags, readers and the devices
IoT Architecture - Access Gateway Layer
First data handling, message identification and routing
IoT Architecture - Internet Layer
Crucial layer which serves as main component to allow communication
IoT Architecture - Middleware Layer
Sits between application and hardware; handles data and device management, data analysis and aggregation.
IoT Architecture - Application Layer
Responsible for delivery of services and data to the user
IoT Attack - Sybil Attack
Uses multiple forged identities to create the illusion of traffic
IoT Attack - HVAC Attacks
attacks on HVAC systems
IoT Attack - Rolling Code
The ability to jam a key fob’s communications, steal the code and then create a subsequent code.
IoT Attack - BlueBorne
Attacks against Bluetooth devices
What is the IoT Hacking Methodology ?
- Information Gathering 2. Vulnerability Scanning. 3. Launch Attacks 4. Gaining Access. 5. Maintaining Access