Potential security threats for IoT
Compare IoT and internet protocol stack
IoT
- CoAP (constrained application protocol)
- UDP (for close networks)
- 6LowPAN
- MAC
- PHY
Internet
- HTTP
- TCP
- IP
- MAC
- PHY
Main characteristic of CoAP used in IoT
Has very restricted formats for security reasons
Compare secure IoT and internet protocol
IoT
- CoAPs (constrained application protocol)
- DTLs
- IP/TPSec
- MAC
- PHY
Internet
- HTTP
- TLS
- IP/IPSec
- MAC
- PHY
Draw schematic of symmetric-key cryptographic algorithm (SKA) (L10 5)
write
Mention some example of IoT ecosystem security attacks
What is a wormhole attack?
It creates an unauthenticated channel between two points
Advantages of hardware security
Main ideas of physical unclonable functions PUFs
Describe in more detail PUF classifications
Explain basic idea of coating PUFs (L10 12)
Main ideas of physical obfuscated keys (POKs)
Cause of variations on PUFs