Cryptography and Security in the Internet of Things

by Nov 20, 2020IoT Security

Cryptography is the process of securing information by transforming the information into a secure format and vice versa. In other words, encrypting and decrypting the formation to secure it. Firstly, let’s understand the security issues in IoT to understand the role of cryptography in securing IoT devices.

IoT Architecture

In short, IoT has three layers of architecture i.e., the Perception layer, the Network layer, and the Application layer.

  • Firstly, The Perception layer is concerned with collecting and sensing the information on IoT objects. The collection of information is done in this layer with the help of different devices such as sensor nodes, smart cards, and RFID tags.
  • Secondly, The Network layer is concerned with managing wireless and wired connections. that is to say, It transfers the gathered data through the sensors and computers across the wired and wireless networks.
  • Finally, The Application layer is the interface between the applications and the end-users. Certainly, It provides the means for communication between them.

Security Concerns at Perception layer

Unauthorized accessDue to physically capture or logic attacked, the sensitive information at the
end-nodes is captured by the attacker
AvailabilityThe end-node stops to work since physically captured or attacked logically
Routing attackCertainly, Attacks on a routing path
Denial of Services (DOS)In short, an attempt to make an IoTend-node resource unavailable to users
Transmission threatsThreats in transmission, such as interrupting, blocking, data manipulation, etc.

Security Concerns at Perception layer

Data breachInformation release of secure information to an untrusted environment
Transmission threatsThreats in transmission, such as interrupting, blocking, data manipulation, etc.
Denial of Services (DOS)In short, an attempt to make an IoTend-node resource unavailable to users
Routing attackCertainly, Attacks on a routing path
Malicious codeFor example Virus, junk message that can cause software failure

Security Concerns at the Application layer

Remote configurationIn short, Fail to configure at interfaces
Misconfiguration To sum up, Mis-configuration at remote IoT end-node, end-device, or end-gateway
Security ManagementLogs and keys leakage
Management systemFailure of the management system
  • Above all, the area of use of cryptography in the internet of things is in securing the communication channels.
  • IoT-centric communication protocols, for example, MQTT and AMQP allow developers to use Transport Layer Security (TLS) to ensure all data sent over the network is unreadable to outside parties.
  • TLS is the rightful heir to the better-known standard known as Secure Sockets Layer (SSL), which was the long-time standard for web encryption (see HTTPS) but is now considered insecure.
  • TLS ensures that data between two entities is not readable nor prone to manipulation by third parties.
  • In addition to encrypting the main data connections, it’s also important to encrypt any available secondary communication channels such as those use for maintenance or customer features.
  • For instance, if an IoT device comes with a web portal for use by consumers (think of a web interface for a printer) that should also come encrypted by default.
  • That is to say, anyone on the same network could intercept usernames, passwords, or use session data to impersonate those logged in to control these devices. For the same reason, insecure maintenance interfaces like telnet should be shuttered in favor of secure approaches like Secure Shell (SSH).

According to recent research, Cryptography (or more specifically, Symmetric Cryptography) will be a key point in order to provide security for IoT environments. Therefore, in addition to confidentiality, integrity, privacy, availability, suitability, non-repudiation, and trust, security technologies including cryptography have also become relevant in this domain.


Creating a multiplication Skill in Alexa using python

Written By Monisha Macharla

Hi, I'm Monisha. I am a tech blogger and a hobbyist. I am eager to learn and explore tech related stuff! also, I wanted to deliver you the same as much as the simpler way with more informative content. I generally appreciate learning by doing, rather than only learning. Thank you for reading my blog! Happy learning!

RELATED POSTS

Logic Locking: Advancement to IoT Security

Logic Locking: Advancement to IoT Security

Logic locking technology is one of the latest advancement in the improvement of IoT security to protect your devices from cyber attacks. Before knowing that lets talk about Internet of Things (IoT). What is IoT ? The Internet of Things (IoT) is a new, but at the same...

Security Tools For IoT

Security Tools For IoT

Security is required for the connecting things on internet and some of the tools and solutions used are: 1.M2MLabs Mainspring: M2MLabs is a set of M2MLabs. Mainspring is an open-source technology platform for developing M2M (machine-to-machine) applications. Including...

Advanced Encryption Standard – AES Algorithm

Advanced Encryption Standard – AES Algorithm

Encryption is a key feature for securing information. Encryption is basically converting any normal yet confidential message to an encoded and unreadable format for high-security purposes. This unreadable text is known as ciphertext. There are many Encryption...

Cloud Security

Cloud Security

Cloud security consists of several protocols and policies. There are several procedures and technologies which are required to maintain cloud-based systems. Also, it helps in protecting cloud data and giving protection to the privacy of users. Set of protocols are...

Secure Shell Protocol (SSH Protocol)

Secure Shell Protocol (SSH Protocol)

What is SSH Protocol? Secure Shell Protocol or SSH Protocol is a protocol for secure remote login over an insecure network. SSH achieves to provide a secure channel over the insecure channel by using client-server architecture, connecting an SSH client to the SSH...

Hashing in IoT

Hashing in IoT

Hashing is transforming a string of characters into a usually shorter value of a fixed length representing the original string. Besides faster data recovery, Hashing is also used to encrypt and decrypt digital signature. Introduction The number of interconnected...

Blockless DAG IoT network

Blockless DAG IoT network

Technology is constantly evolving and improving. Phones were once connected via a wire, then became wireless, and we now have smart mobile devices. The history of technology goes a long way to prove that it is indeed true that all technology constantly upgrades. True...

VIDEOS – FOLLOW US ON YOUTUBE

EXPLORE OUR IOT PROJECTS

IoT Smart Gardening System – ESP8266, MQTT, Adafruit IO

Gardening is always a very calming pastime. However, our gardens' plants may not always receive the care they require due to our active lifestyles. What if we could remotely keep an eye on their health and provide them with the attention they require? In this article,...

How to Simulate IoT projects using Cisco Packet Tracer

In this tutorial, let's learn how to simulate the IoT project using the Cisco packet tracer. As an example, we shall build a simple Home Automation project to control and monitor devices. Introduction Firstly, let's quickly look at the overview of the software. Packet...

All you need to know about integrating NodeMCU with Ubidots over MQTT

In this tutorial, let's discuss Integrating NodeMCU and Ubidots IoT platform. As an illustration, we shall interface the DHT11 sensor to monitor temperature and Humidity. Additionally, an led bulb is controlled using the dashboard. Besides, the implementation will be...

All you need to know about integrating NodeMCU with Ubidots over Https

In this tutorial, let's discuss Integrating NodeMCU and Ubidots IoT platform. As an illustration, we shall interface the DHT11 sensor to monitor temperature and Humidity. Additionally, an led bulb is controlled using the dashboard. Besides, the implementation will be...

How to design a Wireless Blind Stick using nRF24L01 Module?

Introduction Let's learn to design a low-cost wireless blind stick using the nRF24L01 transceiver module. So the complete project is divided into the transmitter part and receiver part. Thus, the Transmitter part consists of an Arduino Nano microcontroller, ultrasonic...

Sending Temperature data to ThingSpeak Cloud and Visualize

In this article, we are going to learn “How to send temperature data to ThingSpeak Cloud?”. We can then visualize the temperature data uploaded to ThingSpeak Cloud anywhere in the world. But "What is ThingSpeak?” ThingSpeak is an open-source IoT platform that allows...

Amaze your friend with latest tricks of Raspberry Pi and Firebase

Introduction to our Raspberry Pi and Firebase trick Let me introduce you to the latest trick of Raspberry Pi and Firebase we'll be using to fool them. It begins with a small circuit to connect a temperature sensor and an Infrared sensor with Raspberry Pi. The circuit...

How to implement Machine Learning on IoT based Data?

Introduction The industrial scope for the convergence of the Internet of Things(IoT) and Machine learning(ML) is wide and informative. IoT renders an enormous amount of data from various sensors. On the other hand, ML opens up insight hidden in the acquired data....

Smart Display Board based on IoT and Google Firebase

Introduction In this tutorial, we are going to build a Smart Display Board based on IoT and Google Firebase by using NodeMCU8266 (or you can even use NodeMCU32) and LCD. Generally, in shops, hotels, offices, railway stations, notice/ display boards are used. They are...

Smart Gardening System – GO GREEN Project

Automation of farm activities can transform agricultural domain from being manual into a dynamic field to yield higher production with less human intervention. The project Green is developed to manage farms using modern information and communication technologies....