SL4 Flashcards
What are some security improvements and enhancements in the IoT infrastructure?
o Penetration testing
o End-to-end encryption
o Persistent authentication
o Scalability testing
o Secure decentralised computing
o Use of AI
o Securing cloud
What is penetration testing?
Penetration testing: testing to find security vulnerabilities and calculate a risk factor
Explain blockchain based security techniques for IoT.
Blockchain is a distributed ledger that provides data security using a distributed and shared ledger
Each entry is tightly coupled with the previous entry using cryptographic hash keys
Example: Ethereum
What is used to store transactions in the block chain?
Merkle tree
Why is difficult for adversaries to tamper with the blocks in a Merkle tree in blockchain?
Due to the presence of cryptographic hash keys in each block
Which type of blockchain is more suited for IoT applications?
Permission based blockchain
What are the two types of blockchain?
Permission-less:
o No permission is needed for a user to join blockchain
o Offers decentralization and transparency
o Ex: Bitcoin, cryptocurrencies
Permissioned:
o Have a defined set of rules for blockchain participation
o Offers better scalability
Explain ML based security techniques for IoT.
Can be used to design intrusion detection and prevention systems
Parameters such as CPU usage, memory utilization and power consumption can be used as features to train a prediction model
Can be used to classify the network traffic in IoT into different categories
What are the 4 types of security techniques for IoT?
Blockchain-based
ML-based
Fog computing based
Edge computing based
What are 2 ways ML based security can prevent security attacks?
Detecting Dos/DDos Attacks: MLP based protocols and deep learning based techniques can be used to secure IoT networks
Detecting Eavesdropping attacks: reinforcement learning can provide protection
Privacy leakage: privacy-preserving scientific computations based techniques
Digital fingerprinting: various ML techniques can overcome digital fingerprinting techniques
How can ML based security detect DoS/DDoS attacks?
MLP based protocols and deep learning based techniques can be used to secure IoT networks