SL1 Flashcards

1
Q

Why is data security important in IoT?

A

Trusted devices and data that make impactful decisions, add value to the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 6 security requirements of IoT?

A

Confidentiality: ensures the system data is only available to the authorised users and no other user can read the data

Integrity: ensures accurate data and that the data cannot be modified through illegal means

Availability: the system devices and the data are always available to its valid users

Authenticity: only valid and authorised devices can connect to the system and gain access to data and resources

Privacy: the data can only be controlled by its corresponding user

Trust: the security and privacy objectives are achieved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between authentication and identification?

A

Identification ensures that only genuine and valid devices or applications can gain access
(recognizing the identity)

Authentication ensures that the devices or applications that request the data are legitimate
(verifying the claimed identity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between side channel attacks and node capture attacks?

A

Side channel attacks do not want to fully control nodes, but node capture attacks do. Side channel attack simply want to monitor the node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which security requirement do eavesdropping and interference attacks violate?

A

Eavesdropping attacks violate confidentiality because they involve unauthorized access to and interception of sensitive information.

Interference attacks violate integrity because they disrupt the normal flow of data and can manipulate or corrupt the transmitted information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the vulnerabilites that could affect the sensing/perception layer?

A

Tampering with collected data

Destroying sensing devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 6 security attacks at the sensing/perception layer?

A

Node capture attacks: attacker can capture and control the node or device in IoT by physically replacing the node or tampering with the hardware

Malicious code injection attacks: malicious code can be injected into the memory of the compromised node or device

False data injection attacks: the attacker can inject false data in place of normal data and transmit the false data to IoT applications

Side channel attacks: require physical access to the sensing devices and can be based on monitoring and analysing its physical parameters

Eavesdropping and interference attacks: the attackers may eavesdrop and capture the data during different phases

Sleep deprivation attacks: attackers try to drain the battery of low-powered IoT devices by keeping them awake unnecessarily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can the 6 security attacks at the sensing layer be solved?

A

Node capture attacks: Implementing identification and authentication protocols

Malicious code injection attacks: authentication schemes

False data injection attacks: design techniques to detect and drop the false data

Side channel attacks: encryption algorithms and key management schemes

Eavesdropping and interference attacks: secure encryption algorithms, key management schemes, and noise data adders

Sleep deprivation attacks: secured duty-cycle mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 4 layers in an IoT architecture (security)?

A

sensing layer
network layer
middleware layer
application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly