L10 Flashcards

1
Q

Potential security threats for IoT

A
  • Cloning of smart objects
  • Malicious substitution of smart things
  • Firmware attacks
  • Extraction of security parameters
  • Man-in-the-middle attakcs during key exchange
  • Routing attacks
  • Same threats as internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Compare IoT and internet protocol stack

A

IoT
- CoAP (constrained application protocol)
- UDP (for close networks)
- 6LowPAN
- MAC
- PHY
Internet
- HTTP
- TCP
- IP
- MAC
- PHY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Main characteristic of CoAP used in IoT

A

Has very restricted formats for security reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compare secure IoT and internet protocol

A

IoT
- CoAPs (constrained application protocol)
- DTLs
- IP/TPSec
- MAC
- PHY
Internet
- HTTP
- TLS
- IP/IPSec
- MAC
- PHY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Draw schematic of symmetric-key cryptographic algorithm (SKA) (L10 5)

A

write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mention some example of IoT ecosystem security attacks

A
  • Network layer: sniffing attack
  • Application layer: DoS attack, worm-virus attack
  • Perception layer: node replication attack, jamming attack, DoS attack, wormhole attack, information routing attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a wormhole attack?

A

It creates an unauthenticated channel between two points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advantages of hardware security

A
  • software authentication is not the most efficient way
  • physical functions cannot be copied or altered by external attackers
  • useful in: identity, military, automotive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Main ideas of physical unclonable functions PUFs

A
  • offer DNA-like identification techniques
  • unpredictable and unclonable properties, impossible to regenerate, model or alter
  • classified into: non-electronic, analog electronics, delay-based, memory-based
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe in more detail PUF classifications

A
  • Non-electronic: optical, paper, CD, RF-DNA, magnetic
  • analog electronic: CMOS Vt, coating, LC
  • delay-based: arbiter, ring oscillators
  • memory-based: S-ram, butterfly, latch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain basic idea of coating PUFs (L10 12)

A
  • a conductive structure is designed for example to create an intentional capacitance
  • by measuring the capacitance the object can be identified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Main ideas of physical obfuscated keys (POKs)

A
  • key is permanently stored in a physical way instead of digital memory
  • any invasive attack will permanently destroy the key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cause of variations on PUFs

A
  • non-uniform conditions during fabrication
  • variations in process parameters (oxide thickness)
  • aging effects
  • variation in dimensions of devices
  • ambient effects (i.e. temperature)
  • variation in circuit characteristics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly