Key Vulnerabilities in Internet of Things: A Holistic View

Key Vulnerabilities in Internet of Things: A Holistic View

Kavitha Ammayappan (University of Hyderabad, India), Arun Babu Puthuparambil (Indian Institute of Science, Bengaluru, India) and Atul Negi (University of Hyderabad, India)
DOI: 10.4018/978-1-7998-2444-2.ch002
OnDemand PDF Download:
Available
$29.50
No Current Special Offers
TOTAL SAVINGS: $29.50

Abstract

Internet of things (IoT) is a buzzword around the globe. Academics and industries are evolving to solve real-world problems with emerging technologies; IoT is one among them. Now, it's very prevalent to see IoT devices in varied application domains like healthcare, hospitality, home, oil and gas, aviation, agriculture and marketing, cold storage chains, food preservation industries, automobile, environmental pollution monitoring sectors, energy industries, marine and fisheries, dairy and poultry, logistics, smart home and smart city, etc. Industries and research institutes are focusing to enrich environment and ecosystem to bring back green world again for the millennials and our future generations to make this globe as a potential place to cherish. In this mission, IoT is playing a major role of protection and preservation. In parallel, hackers are trying to destroy this mission by exploiting varied cyber vulnerabilities. To make IoT systems robust against those vulnerabilities it is necessary to understand the key vulnerabilities in detail.
Chapter Preview
Top

Overview Of Iot Systems

IoT Architecture varies with respect to its use cases as it is being used in varied domains such as connected vehicles, smart home, smart cities, agriculture, energy sector, environment pollution protection arena, connected health, automation domains etc. Almost all IoT architecture is backed up by cloud infrastructure which mainly takes care of data analytics. Most of the commercial IoT solutions are based on either open source IoT platforms such as FIWARE, OpenMTC, SiteWhere and Webinos or based on proprietary solutions such as AWS IoT, IBM’s Watson IoT Platform, Microsoft’s Azure IoT Hub and Samsung’s SmartThings. Most of the IoT architecture consists of five layers namely, sensors / actuators, devices, gateway, IoT Integration Middleware and Applications.

The definition on the above components are given below in Table 1 as specified in (J.Guth et al. 2018).

Table 1.
Definition of IoT Components
IoT Ecosystem ComponentsDefinition
SensorCaptures information by responding to a physical stimulus and transfers it to connected device via electrical signals.
ActuatorReceives command from device and translated electrical signal into physical action.
DeviceHardware with a processor and storage; runs software and communicated with IoT integration middleware
GatewayHas ability to translate different protocols and forwards data over IP and vice versa.
IoT Integration MiddlewareServes as an integration layer. Receives, processes, sends data and thus controls devices. It may have databases, graphical dashboards to manage devices and users. It can be accessed via APIs.
ApplicationRepresents software and connects with Middleware to gain physical environ insight via sensors or manipulate physical world via actuators.

Complete Chapter List

Search this Book:
Reset