Assignment
Assignment
Assignment
GROUP ASSIGNMENT.
GROUP 7.
NAME REG. NO
EMMANUEL K KOSKEI CT206/0023/18
WELDON K KENEI CT206/0024/18
COLLINS KIPKOSGEI CT206/0023/16
NDUNG’U ERIC CT206/0020/15
Introduction
The era we live in is faces by the ever-growing technological advancements. The world’s
most used machines are now evolving to be smart just like other smart machines like
computers. In this document we give a summary of articles about Internet of Things (IoTs). It
explains what IoTs are, their impact and significance in today’s world, their applications,
threats and hoe to secure them from the threats.
Internet of things can be defined as a paradigm or a network of objects that are equipped with
actuators, sensors and processors where they communicate to serve their purpose. Sensors
and actuators are devices which help with interacting with the environment. Broadly, sensors
can be defined as devices that can provide input of its current state (internal state +
environment). Actuators on the other side are devices that are used to effect change on the
environment.
Transport layer
Perception layer
Perception layer
Figure 1: layers of IoT
The perception layer is the physical layer where sensors gather information from the
environment. It senses some physical parameter or identifies other smart objects.
The network layer is responsible for connection between other smart objects, network
devices and servers. Most of its features are used in transmitting and processing sensor data.
The application layer is the layer responsible for delivering application specific services to
users.
On the other five-layered architecture as shown above, the perception and application layer
perform same functionalities whereas the rest differ.
The network layer is responsible for transmission of sensor data from perception layer to
application layer and vice-versa using different channels such as wireless, 3G, Bluetooth,
RFID among others.
The processing layer also known as the middleware layer, stores, analyze, and process huge
amount of data that come from the transport layer. It employs other technologies such as
database, cloud computing and Big data processing modules.
The business layer manages the whole IoT system including the application, business and
profit models and user privacy.
From the analysis of the potential security threats of mDNS, we identified and classified the
attacks as follows:
Denial of Service attacks: attackers flood mDNS-enabled nodes with messages that
exploit specific characteristics of the protocol. These messages could make nodes
unresponsive or unavailable by invalidating cache entries or blocking the probing
process;
Poisoning attacks: attackers spoof mDNS response messages and advertise fake
services frequently exploited for further attacks towards unaware nodes;
Remote attacks: attackers exploit mDNS-enabled nodes responding to queries from
outside to abuse services for various purposes, e.g., Distributed Denial of Service
reflection attacks, collection of sensitive information.
Types of attacks on IoT
The IoT in general as a system is prone to attacks such as:
1. Distributed denial-of-service attack (DDoS attack):
A DoS attack can be done in a several ways. The basic types of DoS attack include:
Flooding the network to prevent legitimate network traffic
Disrupting the connections between two machines, thus preventing access to a service
Preventing a particular individual from accessing a service.
Disrupting a service to a specific system or individual.
Disrupting the state of information, such resetting of TCP sessions.
2. Eavesdropping Attack:
An eavesdropping attack, which are also known as a sniffing or snooping attack, is an
incursion where someone tries to steal information that computers, smartphones, or other
devices transmit over a network. An eavesdropping attack takes advantage of unsecured
network communications in order to access the data being sent and received. Eavesdropping
attacks are difficult to detect because they do not cause network transmissions to appear to be
operating abnormally.
3. Clickjacking:
Clickjacking (User Interface redress attack) is a malicious technique of tricking a Web user
(in this case an IoT) into clicking on something different from what the user perceives they
are clicking on, thus potentially revealing confidential information or taking control of their
computer while clicking on seemingly innocuous web pages. This makes the device in case to
be fooled to do malicious activities.
4. Phishing
Phishing is the fraudulent attempt to obtain sensitive information such as usernames,
passwords and credit card details, often for malicious reasons, by disguising as a trustworthy
entity in an electronic communication. Phishing can be used to trick IoTs into sending or
retrieving sensitive information of a particular system.
5. Spoofing
Spoofing is a malicious practice employed by cyber scammers and hackers to deceive
systems, individuals, and organizations into perceiving something to be what it is not.
Communication is initiated by the spoofer to the victim or system from an unknown source
but disguised to present itself as an authentic and safe sender.
Security of IoT
IoT Security is the area of effort concerned with safeguarding connected devices and
networks in the internet of Things. Most of the technical security concerns are similar to
those of conventional servers, workstations and smartphones, but security challenges unique
to the IoT continue to develop, including industrial security controls, hybrid systems, IoT-
specific business processes, and end nodes.
While security is a concern there are many things being done to protect device. Device Data is
following cryptographic standards and encryption is being used in end-to-end scenarios. The overall
understanding of IoT is essential for basic user security. Keeping up with current antivirus software
and strengthening updates will help mitigate cyber attacks.
The following diagram gives a summary on how we can safeguard the IoT.
DATA
BACKUP
CRYPTOGRAP
HUMAN
HY
ASPECTS
SECURITY
MEASURES
FIREWALL ANTI
VIRUS
ANTI
SPYWARE