Essays.club - Get Free Essays and Term Papers
Search

Asymptotic Analysis

Autor:   •  March 25, 2018  •  5,196 Words (21 Pages)  •  444 Views

Page 1 of 21

...

Cisco, one of the major networking companies are working towards IoT infrastructure security and have already taken initiatives to provide robust security models for the Internet of Things [3]

The most common challenges of IoT security development is viability and technical maturity.

SECURITY Threats and Challenges in IoT

In the development of any IoT application security and testing frameworks play an important role. To help you create more secured and attack proof internet of things enabled devices and applications we have outlined top security concerns you should address.

Security and privacy is an important aspect of IoT development and devices. Securing data and testing standard guidelines for securing the device are essential. The most common security architectures developed and deployed in IoT devices are explained below

Solutions of IoT security Problems

- Device cloud and app security (End-to-End Encryption)

End-to-End security can be defined as a security precaution to secure data when transmitting from one end to another end.

“End-to-End security relies on protocols and mechanisms that are implemented exclusively on the endpoints of a connection. The most typical example is an HTTPS connection (for example, on Transport Layer Security to a web server IP Security (IPsec) can also be used for end-to-end security” [3]

[pic 5]

- End-to-End Security Components:

The End-to-End security that is security of communication between client server or peer to peer, comprises of five main components namely Identity, Protocols, Algorithms, Secure Implementation and secure Operation.

- Identity:

Identity is a component in end-to-end security to verify the entity identities of both ends. An individual identity can be verified from the given information such as the username and password whilst the identity on the other if it is a server can be done by verifying the server digital certificate.

- Protocols:

Protocols are based on algorithm that are developed to perform security function for instance performing negotiation for the session keys along with encrypting and verifying the integrity for the connection.

- Algorithms:

The algorithms in end-to-end security are designed in such a way that the data was secured when in transit from one end to another using session keys.

- Secure Implementation:

The end-to-end security make sure that the protocols on either end of the communication are secure without any malicious bug that could become the reason for the security breach.

- Secure operation:

Secure component is an important component of end-to-end security as it requires both the operators and users to be knowledgeable of the security contrivance and if there are any security exception how to tackle these exceptions.

All the components of end-to-end security should be secure to get optimal results. The data was secured using protocols and algorithm and cannot be tampered when is transmitting from one end to another.

- Authentication Authorization Accounting (AAA) Security

AAA security is essential for effective network management and security.

“Authentication Authorization Accounting (AAA) is a term that refers to the management of the access to specific resources using strict policies. This access control is carried out also auditing resources usage, providing billing capabilities for services [Reference]

- Authentication:

The initial step of AAA architecture is user authentication. The authentication process is done by identifying users with a unique identifier before permission is granted. This identifier is mostly a username and a unique password associated with that username. The database in which these credentials are already stored were then check if the username and password provided is inside the database or not. If the credentials vary as that in database, then the access to network is denied otherwise once the credentials match the user have permission to access network.

- Authorization:

The next step once the user has been granted a permission to access the network is Authorization. Authorization is the process that provides user the permission to perform certain tasks. Authorization crosscheck the eligibility of the user for that task by using policies. Once the policies are fulfill by the user the eligibility of the user to all the tasks will be provided.

- Accounting:

Accounting is the final step of AAA security. Accounting is basically keeping account of user activity as well as consumed resources during the time user has been granted permission to access the network. This data is stored in a database.

The accounting module works auditing the usage of resources accessed by users. Potential applications of these measures might include billing, trend analysis and resource utilization [Reference]

The AAA security system can be integrated as an IoT Engine providing more secure access and accounting abilities as can be seen in figure.

[pic 6]

- Physical Security

Security in IoT mostly refer to cloud computing and network systems. User authentication, monitoring events, using cryptosystems to encrypt and secure data. As the number of devices on IoT is increasing rapidly as can be seen in figure. The Physical security is a major challenge in IoT development.

[pic 7]

Physical security is the protection of life and property and includes things as diverse as people, hardware, programs and even the data that occurs from an event that causes loss or damage [Reference]

As the devices are more remote and connected wirelessly that makes the physical network architecture more complex. Physical security of IoT is represented by external context and inherent infrastructure [Reference]

- External

...

Download:   txt (34.2 Kb)   pdf (87.9 Kb)   docx (31.3 Kb)  
Continue for 20 more pages »
Only available on Essays.club