Beruflich Dokumente
Kultur Dokumente
MODULE 3
➢
➢
❖ The IOT / M2M devices use CoAP and LWM2M web communication
protocols and message communication protocols such as message
cache, MQTT and XMPP.
❖ They use the communication and communicate over the web
gateway.
What is open source gateway initiative (OSGI). Write the features of eclipse iot stack.
Open IoT Stack for Java. Based on open source and open standards, the
Open IoT Stack for Java simplifies IoT development by allowing developers to re-
use a core set of frameworks and services in their IoT solutions.
❖ Why It Matters
❖
❖ The Internet of Things is a tremendous opportunity for
organizations and developers to create new solutions that connect
devices to the Internet.
❖ The complexity of creating IoT solutions makes it difficult for
developers to deliver new innovative solutions. The current state
requires developers to create proprietary and closed solutions that
are locked into a particular vendor, don’t easily interoperate, and
are slow to deliver.
❖ There are a number of emerging IoT standards (MQTT, CoAP,
Lightweight M2M) that will make it possible for devices to connect
and interoperate. Open source implementations of these standards
will make it easier for developers to adopt these standards.
❖ There are 9 million Java developers that will bridge the world
between enterprise and embedded development. Providing open
source Java frameworks and services will make it easier for Java to
become a language for IoT.
❖ Similar to the way the Internet evolved to run on an open source
foundation (Apache, Linux, etc), the IoT’s success will hinge on the
establishment of open source technologies at its core that everyone
can use to enable connectivity and interoperability.
The following are the solutions for the mitigating the attacks:
Layer 1 solution:
The devices used decide the type of security required.
Layer 2 solution:
Programming the network switches to prevent internal node attacks
during the use of DHCP or spanning tree protocol. Additional controls
may includeARPinspection,disabling the unused ports and enforcing
effective security on VLANs.
Layer 3 attack solution:
Use a temper resistant router, use of packet filtering and controlling
routing messages and packets data between the layers 3 and 4 through
the firewalls reduces the risk.
Layer 4 attack solution:
Port scanning method is a solution which identifies the vulnerable port.
Layer 5 attack solution:
Application level attacks are a resultant of poor coding practices.web
applications/services can use HTTPS communication link.