IOT security
Here is a mind map about IoT security
Tags:
Similar Mind Maps
Outline


1. IOT protocols and standards
2. Security requirements for IOT
Data privacy, confidentiality and integrity
Authentication, authorization and accounting
Availability of services
Energy efficiency
3. Single points of failure

Low-level Security Issues
- jamming adversaries - Insecure initialization - Lower-level Sybil and spoofing attacks - Insecure physical interface - Sleep deprivation attack
Intermediate-level Security Issues
- Replay or duplication attacks due to fragmentation - Insecure neighbor discovery - Buffer reservation attack - RPL routing attacks - Sinkhole and Wormhole attacks - Sybil attacks on Intermediate layers - Authentication and secure communication - Transport level end-to-end security - Session establishment and resumption - Privacy violation on cloud-based IoT
High-level Security Issues
- CoAP security with internet - Insecure interface - Insecure Software/firmware - Middleware Security

Background
Potential
Sub Topic
Sub Topic

Low-level Security solutions
Intermediate-level Security solutions
High-level Security solutions