IoT Flashcards
5 types of IoT
Consumer
Commercial
Industrial
Infrastructure
Military
What is an IoT?
IoT are devices that can be assigned IP addresses or unique identifiers
Why is IoT vulnerable?
IoT devices collect information about users and their environment, including personally identifiable, commercially confidential and/or sensitive data.
Why does IoT infrastructure have security challenges?
There is limited collaboration for initiatives to secure systems and ensuring interoperability between them.
What is one exploit example?
Chrysler’s in-vehicle connectivity system hacking Jeep’s media center, windshield wipers, air conditioner and accelerator.
Mirai IoT botnet attacking journalist website and Dyn’s network making Amazon, Twitter and Netflix to be unavailable for hours.
What is a constrained node?
IoT devices that are typically battery-operated and has low computing power.
What is a constrained network?
A network of constrained nodes resulting to low throughput, high packet loss and asymmetric link characteristics (eg. A-B better quality transmission than B-A).
What it RPL?
Routing Protocol for Low power and Lossy Network which can also known as distance vector as it manipulates vectors (tables) of distances from other nodes in the LLN.
Explain direction metric
Next hop address and output port.
Explain distance metric
Cost-based (eg. energy needed, number of hops).
Why is RPL also known as Source Routing Protocol?
Sender can partially or completely specify the route that the packet should take through the LLN.
What are border routers?
Routers that route between the local network and an external one (e.g. Internet) or to the cloud.
Why are (RPL) Source Routing Protocol used?
Allows easier troubleshooting and enables a node to discover all the possible routes to a host.
2 mode of operations for RPL
Storing and non-storing
What is storing mode?
Intermediate routers maintaining route tables. A downward routing table is kept at each node and traffic travels only as far as the common parent. Searching for the destination each node at a time
What is non-storing mode?
Node broadcasting message to everyone to where the receiver is when it replies.
What is the difference with DODAG and DAG?
DODAG has only 1 root node
What is a DODAG?
It is a direction oriented directed acylic graph. A graph with directed edges and no cycles.
ETX rank computation formula
Rank (X) = Rank (parent) + ETX (X, parent)
The higher the link quality the lower link cost and a lower ETX.
Residual energy rank computation formula
Rank (X) = Rank (parent) + (MAX_energy_ – X_energy_)
The higher the link quality the lower link cost and a higher energy.