Mind Map Gallery IOT security
无数据
Here is a mind map about IoT security
Edited at 2021-02-08 12:34:46IOT security: review, blockchain solution, and open challenges
IOT architecture and security challenges
1. IOT protocols and standards
2. Security requirements for IOT
Data privacy, confidentiality and integrity
Authentication, authorization and accounting
Availability of services
Energy efficiency
3. Single points of failure
Categorization of security issues
Low-level Security Issues
- jamming adversaries - Insecure initialization - Lower-level Sybil and spoofing attacks - Insecure physical interface - Sleep deprivation attack
Intermediate-level Security Issues
- Replay or duplication attacks due to fragmentation - Insecure neighbor discovery - Buffer reservation attack - RPL routing attacks - Sinkhole and Wormhole attacks - Sybil attacks on Intermediate layers - Authentication and secure communication - Transport level end-to-end security - Session establishment and resumption - Privacy violation on cloud-based IoT
High-level Security Issues
- CoAP security with internet - Insecure interface - Insecure Software/firmware - Middleware Security
Blockchain solutions for IoT security
Background
Potential
Sub Topic
Sub Topic
Security solutions for IoT
Low-level Security solutions
Intermediate-level Security solutions
High-level Security solutions