top of page

Wearable Devices

1. Pebble Steel

2. Fit bit flex

3. Jawbone UP3

4. Motorola Moto 360

5. LG G Watch R

6. Fitbit Charge HR

7. Sony SmartWatch 3

8. Samsung Gear Live

9. Garmin Forerunner 620

10. Martian Notifier

11. Whistle

12. Moov

13. Ringly

14. Project Morpheus

15. Barclaycard

16. Apple Watch

17. Epson Moverio BT-200 - Smart Glasses - Developer Version

18. VUZIX M100 Smart Glasses Prosumer, Gray,

19. Lg - Watch Urbane Smartwatch 46mm Stainless Steel - Silver Leather

20. Pebble

21. android smart bracelet d3 waterproof bluetooth

22. Ring Wearable Adhesive Phone Stand & Mount for Mobile Phon

 

 

 

Automobile

1. Volvo

2. BMW

3. GM

4. Ford

5. Chevrolet

6. Honda

7. Audi

8. Jaguar

9. acura

10. Bentley

11. Citroen

12. Subaru

13. Volkswagen

Home Automation

1.Nest Thermostat

2. Honeywell Lyric Thermostat

3. Sentri

4. Canary

5. Goji

6. Revolv

7. Homey

8. Tado Cooling

9. SmartThings

10. Ninja Sphere

11. Color changing LED

12. Smart Lock

13. Video Monitor

14. Smart Speaker

15. Nest Protect

16. Smart Garage Door Opener

17. Smart Air Conditioner

18. Smart Cookware

19. Water Monitor

20. Humidity Monitor

21. Light Bulb

22. Smart Home Controlling System

23. Best Bed

24. Home Surveillance: Canary

25. Sprinkler System: RainMachine

26. Hazard Detection: WallyHome

27. Temperature Control: Aros Smart Window Air Conditioner

 

IoT Protocols:

 

As shown in Figure 2, many protocols have been developed at all layers of the International Organization for Standardization (ISO) stack to enable the operation of IoT devices. From messaging protocols such as the Constrained Application Protocol (CoAP), to highly extensible routing protocols such as the Routing Protocol for Low-Power and Lossy Networks (RPL). The important thing to understand about these protocols is that they have been designed with energy preservation in mind, along with low compute and memory requirements.

 

The IPv6 Internet is one of the most important enablers of the IoT as it is not possible to add billions of devices to the IPv4 Internet. It follows that the security considerations and implications of IPv6[7] are fundamental to securing the IoT.

Network Layers of IoT Architecture:

 

While many existing security technologies and solutions can be leveraged in a network architecture, especially across the core and data center cloud layers, there are unique challenges in the IoT space. The nature of the endpoints and the sheer scale of aggregation require special attention in the overall architecture to accommodate these challenges. The Cisco IoT/M2M architecture is composed of four layers, some are similar to those described in conventional Cisco network architectures.

IoT Threats

IPv6, a foundation of the IoT, is subject to the same attack threats as IPv4, such as smurfing, reconnaissance, spoofing, fragmentation attacks, sniffing, neighbor discovery attacks, rogue devices, man-in-the-middle attacks, and others. Therefore, in the core of the network it requires the same security treatments that exist today for IPv4.

However, the IoT opens a completely new dimension to security. The IoT is where the Internet meets the physical world. This has some serious implications on security as the attack threat moves from manipulating information to controlling actuation (in other words, moving from the digital to the physical world). Consequently, it drastically expands the attack surface from known threats and known devices, to additional security threats of new devices, protocols, and workflows. Many operational systems are moving from closed systems (e.g., SCADA, Modbus, CIP) into IP-based systems which further expands the attack surface

The IoT can be affected by various categories of security threats including the following:

 

  • Common worms jumping from ICT to IoT: Generally limited to things running consumer O/S: Windows, Linux, iOS, Android

  • "Script kiddies" or others targeting residential IoT: Unprotected webcams, stealing content, breaking into home control systems

  • Organized crime: Access to intellectual property, sabotage, and espionage

  • Cyber terrorism: Nuclear plants (For example, Stuxnet virus), traffic monitoring, railways, critical infrastructure

 

 

HP researchers tested 10 of the newest connected home security systems and discovered the Internet of Things-connected security systems are full of security FAIL:

 

HP Fortify found an “alarmingly high number of authentication and authorization issues along with concerns regarding mobile and cloud-based web interfaces.”  Under the category of insufficient authentication and authorization, the researchers reported.

 

  • 100% allowed the use of weak passwords

  • 100% lacked an account lockout mechanism that would prevent automation attacks

  • 100% were vulnerable to account harvesting, allowing attackers to guess login credentials and gain access

  • Four of seven systems that had cameras, gavethe owner the ability to grant video access to additional users, further exacerbating account harvesting issues.

  • Two of the systems allowed video to be streamed locally without authentication

  • A single system offered two-factor authentication

 

“Properly configured transport encryption is especially important since security is a primary function of these home security systems.” Yet regarding the encryption that is critical for protecting “sensitive data such as credentials, person information, device security settings and private video to name a few,” they discovered that “50% exhibited improperly configured or poorly implement SSL/TLS.”

 

bottom of page