SL1 Flashcards
Why is data security important in IoT?
Trusted devices and data that make impactful decisions, add value to the device.
What are the 6 security requirements of IoT?
Confidentiality: ensures the system data is only available to the authorised users and no other user can read the data
Integrity: ensures accurate data and that the data cannot be modified through illegal means
Availability: the system devices and the data are always available to its valid users
Authenticity: only valid and authorised devices can connect to the system and gain access to data and resources
Privacy: the data can only be controlled by its corresponding user
Trust: the security and privacy objectives are achieved
What is the difference between authentication and identification?
Identification ensures that only genuine and valid devices or applications can gain access
(recognizing the identity)
Authentication ensures that the devices or applications that request the data are legitimate
(verifying the claimed identity)
What is the difference between side channel attacks and node capture attacks?
Side channel attacks do not want to fully control nodes, but node capture attacks do. Side channel attack simply want to monitor the node.
Which security requirement do eavesdropping and interference attacks violate?
Eavesdropping attacks violate confidentiality because they involve unauthorized access to and interception of sensitive information.
Interference attacks violate integrity because they disrupt the normal flow of data and can manipulate or corrupt the transmitted information.
What are the vulnerabilites that could affect the sensing/perception layer?
Tampering with collected data
Destroying sensing devices
What are the 6 security attacks at the sensing/perception layer?
Node capture attacks: attacker can capture and control the node or device in IoT by physically replacing the node or tampering with the hardware
Malicious code injection attacks: malicious code can be injected into the memory of the compromised node or device
False data injection attacks: the attacker can inject false data in place of normal data and transmit the false data to IoT applications
Side channel attacks: require physical access to the sensing devices and can be based on monitoring and analysing its physical parameters
Eavesdropping and interference attacks: the attackers may eavesdrop and capture the data during different phases
Sleep deprivation attacks: attackers try to drain the battery of low-powered IoT devices by keeping them awake unnecessarily
How can the 6 security attacks at the sensing layer be solved?
Node capture attacks: Implementing identification and authentication protocols
Malicious code injection attacks: authentication schemes
False data injection attacks: design techniques to detect and drop the false data
Side channel attacks: encryption algorithms and key management schemes
Eavesdropping and interference attacks: secure encryption algorithms, key management schemes, and noise data adders
Sleep deprivation attacks: secured duty-cycle mechanism
What are the 4 layers in an IoT architecture (security)?
sensing layer
network layer
middleware layer
application layer