Jai’s Weblog – Tech, Security & Fun…

Tech, Security & Fun…

  • Jaibeer Malik

    Jaibeer Malik
  • View Jaibeer Malik's profile on LinkedIn
  • Subscribe

  • Feedburner

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 31 other followers

  • Archives

  • Categories

  • Stats

    • 401,931
  • Live Traffic

Posts Tagged ‘IOT Security’

IOT Security: Attack surface areas, Vulnerabilities & Considerations

Posted by Jai on January 5, 2017


In this post we will discuss the security aspects around connected devices solution. As typically goes in M2M information flow, from connected devices hardware till the information is available to end-user on dashboard or mobile gadget.

There are varieties of connected devices getting in market day by day. The size and processing power of each of such devices put extra emphasis on the security aspects around these devices. Here we will discuss the information flow in case of connected devices, how data flows from devices to end users of those devices. On top of that what are different attack surface areas, what common vulnerabilities those expose and what are the common ways to eliminate those threats for connected devices.

In the previous posts, we discussed about availability of different type of IOT platforms in market, typical characteristics of such a platform and the technical challenges in building your own IOT platform.

IOT Platform: Typical Characteristics
Building IOT platform, Technical challenges

Below diagram explains the typical IOT data flow, possible vulnerabilities is such system and the considerations to build strong and secure security architecture model for such solution.

iot-security

Information Flow Networks

In a typical IOT scenario, the device captures the data, either using local gateway or telecom the data is transmitted to cloud server for further processing. The processed data is further made available to end consumer or respective events are triggered or information shared further with ecosystem parties.

Commonly below different data flow networks are used in the system,

  1. Device Network
  2. Device Communication Network
  3. Telecom Network
  4. Internet
  5. Hosting/Cloud environment Network
  6. IOT Platform
  7. Mobile applications/Gadgets network
  8. Data Privacy

Read the rest of this entry »

Posted in IOT, Security | Tagged: , , , | Leave a Comment »

Building IOT platform, Technical challenges

Posted by Jai on January 2, 2017


As discussed in the last post regarding the typical characteristics of IOT platforms, there are different categories of available IOT platform these days and typical feature and functional support provided by each. Device connectivity, device agnostic, domain agnostic and extensibility etc. drive to come up with few required technical aspects of such a platform. In this post, we will discuss different technical aspects to be taken into account to build such IOT platform.

Typical characteristics of any IOT platform are as covered in last post.

In general, we can add below typical technical aspects in the architecture of such IOT platform

iot-platform

  1. Device Connectivity
  2. Device repository and management
  3. Data Processing of Events/Rules Management
  4. Alerting, Monitoring & Notification support
  5. Complex Event Processing support
  6. Scalable & Extensible Data storage layer
  7. Real time Data access support
  8. Data Analytics
  9. Data Visualisation support
  10. External Ecosystem system Integration support
  11. IOT Security, Across all layers
  12. Development/Testing Support
  13. Testing/POC/Time to Market support
  14. Device Bi directional support
  15. Device Firmware management support
  16. Data reporting/export/publish/share support

Read the rest of this entry »

Posted in IOT | Tagged: , , , | 1 Comment »

 
%d bloggers like this: