Internet of Things (IoT) includes a new wave of devices that are capable of communicating over the Internet, and they are bringing a new set of challenges in regards to security, communications, and data consumption. Implementation and functionality of IoT devices can bring users many benefits, and one of them is task automation, which would have to be otherwise done by hand – for example, smart metering and process actuation. Because IoT devices are very constrained in the sense of available energy and computation capabilites, security solutions are much more complicated, and they consequently spread the vulnerability and threats. This thesis for easier understanding, will split communications in IoT infrastructure into smaller segments.
Three main IoT architecture segments are sensors for data capture and actuation, local and wide area networks for data transfering in to cloud platforms and cloud in general for data manipulation. The reader will be able to refresh and/or acquire some prior knowledge about IoT data flow, protocols and new technologies that have risen with IoT and big amounts of data before touching the theme about security. In the end, we have set up a pilot solution of IoT system, where we have tried to research and implement different security mechanisms. Consequently, the options that our chosen cloud platform Thingspeak gave us were very limited, so we have implemented the protocol MQTT alongside, which has offered more security solutions between the sensor and gateway. We have also added firewall, which is not primary security solution in IoT, but with usage of TLS and precise authentication, we have got a system that could safely work in the real world.
The main motive in this thesis is, that we present security in IoT with focus on tehnologies, that specificaly concern devices and IoT infrastructure with flavour of good practice from information technology. This way, the reader can get basic information about security in information security, as well as read about the concern regarding IoT devices, their networks, and their security.
|