This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
en:iot-reloaded:cybersecurity_in_iot_systems [2023/10/31 08:47] – created margus | en:iot-reloaded:cybersecurity_in_iot_systems [2025/05/13 15:03] (current) – pczekalski | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== IoT Security |
+ | IoT systems and services are widely adopted in various industries, such as health care, agriculture, | ||
+ | One of the weaknesses of IoT devices is that they can easily be compromised. This is because some IoT manufacturers of IoT devices fail to incorporate security mechanisms into the devices, resulting in security vulnerabilities that can easily be exploited. Some manufacturers and developers often focus on device usability and adding features that satisfy the users' needs while paying little or no attention to security measures. Another reason that IoT device manufacturers and developers pay little or no attention to security because they are often focused on getting the device to the market as soon as possible. Also, some IoT users focus mainly on the price of the devices and ignore security requirements, | ||
+ | |||
+ | Also, IoT hardware constraints make it challenging to implement reliable security mechanisms, making them vulnerable to cyber-attacks. Since batteries with limited energy capacities power IoT devices, they possess low-power computing and communication systems, making it hard to implement sufficient security mechanisms. Using power-hungry computing and communication systems that would permit the incorporation of reliable security mechanisms will significantly reduce the device' | ||
+ | |||
+ | A successful malicious attack on an IoT system could result in data theft, loss of data privacy, and damage to other critical systems connected to the IoT systems. IoT systems are increasingly being targeted due to the relative ease with which they can be compromised. Also, they are increasingly being incorporated into critical infrastructure such as energy, water, transportation, | ||
+ | * The Mirai Botnet attack: An IoT botnet (a network of IoT devices, each of which runs bots) was used to conduct a massive Distributed Denial of service (DDoS) attack against the internet' | ||
+ | * The Stuxnet attack: It is one of the most well-known IoT attacks. It was designed to target the Iranian uranium enrichment plant in Natanz, Iran. The attack compromised the Siemens Step7 software running on a Windows operating system, providing malicious software (worm) access to the industrial program logic controllers. The attack damaged several uranium centrifuges, | ||
+ | * The Jeep Hack: This test attack was conducted by researchers in July 2015 on a Jeep SUV. They successfully took control of the vehicle by exploiting a firmware update vulnerability. They demonstrated that this attack can control the vehicle' | ||
+ | * Cold in Finland: Cybercriminals conducted an IoT-based attack on heating systems in the Finnish city of Lappeenranta by turning off the heating system. They also conducted a DDoS attack on the heating infrastructure, | ||
+ | * The Verkada hack: This attack was conducted against a cloud-based video surveillance service provider, Verkada. The attackers successfully compromised the privacy of their customers (including factories, hospitals, schools, and prisons) by gaining access to live feeds from about 150 000 cameras. This shows the risk of a successful full compromise on IoT cloud/fog computing service providers' | ||
+ | |||
+ | The attacks mentioned above are just a few examples of how cybercriminals may exploit the vulnerabilities of IoT devices to compromise and disrupt services in other sectors, especially the disruption of critical infrastructure. These examples demonstrate the urgent need to incorporate security mechanisms into IoT infrastructures, | ||
+ | |||
+ | Therefore, IoT security involves design and operational strategies to protect IoT devices and other systems against cyberattacks. It includes the various techniques and systems developed to ensure the confidentiality of IoT data, the integrity of IoT data, and the availability of IoT data and systems. These strategies and systems are designed to prevent IoT-based attacks and ensure IoT infrastructures' | ||
+ | |||
+ | <WRAP excludefrompdf> | ||
+ | The following chapters discuss details on cybersecurity in IoT systems: | ||
+ | * [[en: | ||
+ | * [[en: | ||
+ | * [[en: | ||
+ | * [[en: | ||
+ | * [[en: | ||
+ | * [[en: | ||
+ | * [[en: | ||
+ | </ |