There are some components of Cryptographic module and their purposes are given below
FTP_EMSEC.1 TOC Emanation
The main purpose of this component is that it will not limit the TOE when there is excess of specified limits used for enabling access to data and also for user data types. Moreover, it will also ensure that they are unable to gain access to the TSF data and TUD properly
FPT_TST.2 TSF self-testing
There is no specific other components present. The main purpose of this component is to perform self-testing at power up conditions for verifying the correctness of the cryptographic algorithms and also TSF. Moreover, it will also verify the integrity of the software. The next thing is that it will also perform self-testing at different conditions for the correctness of critical cryptographic algorithms. After the end of self-testing it will also take some actions against it.
Use of Cryptography in different layers of IoT system
There are some important layers of IoT system
The first one is related to Things layer and it contain some devices, controllers and sensors.
The second on is connectivity edge layer it will connect it with the computer layer.
The third layer is related to the global infrastructure layer. It will connect all parameters together.
The fourth layer is related to data ingestion layer. This layer will breakdown the data in a proper way.
The fifth layer is related to the data analysis layer. It will analyse the data came from the computer.
The sixth layer is related to the application layer. It will provide complete access to the application.
The seventh layer is related to the people and process layer. It will process the application according to people (Firouzi, 2020).
Part E
IoT attack vectors by OWASP
The attack vectors that are set by the OWASP for IOT are mobile, cloud, device and communication.
It can be noted that mobile is one of the most important platform for the user interface used for IoT through which user are able to see the physical world. There are some mobile applications that communicates with IoT ecosystem and send commands to others. Due to this these devices become the main entry point into the ecosystem of IoT. There is list of some important attack surface present in the mobile devices include storage, communication, encryption, authentication (Firouzi, 2020).
The next attack vector is cloud and it is considered as important pieces of IoT. Due to this it is considered as an important attack point. The main purpose of Cloud is to save data any kind of data. But if there is any risk present in the system the attacker will gain data from the cloud.
There is another attack vector and it is related to Device. This is because it has an interface with the physical world and also able to communicate with the virtual world. Moreover, it is considered as the first step for the physical world data (El Hassan Abdelwahed, 2018).
5 relevant IoT systems
The first system is google home voice control system. It has a complete linked with the IoT systems. It can easily play media, thermostats, lights through the help of IoT
The next one Amazon Echo plus control system. It is involved in playing songs and media through IoT system
Third one is amazon dash button. It is devices that is operated through Wi-Fi means IoT systems
The fourth one is August doorbell cam. It is connected with IoT systems for showing complete image of the person properly
The fifth one is august smart lock, it will lock the doors easily with the help of IoT systems (Paulo Novais, 2019).
IoT services provided by CSP
The first CSP is Amazon web service and the next one is Microsoft Azure.
The IoT services providing by Amazon web service is quite amazing. This is because it is involved in providing computer power, content delivery and database storage through the help of IoT.
On the other hand, there are some IoT services provided by Microsoft Azure are given below. The first one is related to testing of the whole program with IoT. Moreover, it is also involved in managing the application by controlling its data through the help of IoT.
IoT security challenges faced by CSP
There are a lot of IoT challenges faced by CSP, some of them are given below
The first one is related to the control of the system and devices. It can be noted that it is one of the main concern of the small businesses. The fact is that the IoT devices are quite cheap and they are not too much secure. Due to this it will become easy target for the hackers. Therefore, it will become one of the huge challenge for the IoT developer to secure these devices and systems.
The second one is related to compatibility. This is because devices are not compatible with the system and hacked easily, and owners has to pay the price (Muhammad Ikhwan Hanif bin Ismail, 2017).
The next challenge is related to confidentiality with internal threats. It can be noted that IoT based attackers are completely based on the cloud service provider. Due to this case, the cloud data of the small enterprises is not secure.
The next challenge is related to integrity. The devices that are connected with IoT and taking CSP services are becoming and easy target for the malicious activities from the hackers.
The next important challenge is related to the update of the devices. IoT is considered as valuable opportunity for the CSPs. Moreover, CSP is going to increase its future revenue through the help of IoT because it is going to provide vast opportunities for the users. Due to cybercrime issue, it will become one of the huge challenge for IoT to provide services to CSPs.
Compare the seven IoT security issues managed by CSPs
The two CSP are Amazon web service and Microsoft Azure.
Security issues
|
Amazon web service
|
Microsoft Azure
|
User Access
|
The user access is
easy
|
For this make proper
account on the system
|
Regularity
compliance
|
Its terms and
conditions are valuable for the user
|
It contains brief
information about terms and conditions
|
Data location
|
Data is located on
the amazon platform for cloud
|
Data is located at
the Microsoft platform for cloud
|
Recovery
|
Data recovery is not
easy to access
|
It is providing easy
access to the data recovery
|
Data segmentation
|
It is providing
valuable data segmentation for user
|
It is providing
valuable data segmentation for user
|
Investigative
support
|
Investigate support
is moderate
|
Providing efficient
investigation support
|
Long term viability
|
Providing long term
viability
|
Limited time
viability
|
References of Different components of a Cryptographic module
Dr.B.Sivasankari, & C.Arun prabha, S. ,. (2017). IOT based Indoor Air Pollution Monitoring using Raspberry PI . International Journal of Innovations in Engineering and Technology (IJIET) .
El Hassan Abdelwahed, L. B. (2018). Model and Data Engineering: 8th International Conference, MEDI 2018, Marrakesh, Morocco, October 24–26, 2018, Proceedings. Springer.
Firouzi, F. (2020). Intelligent Internet of Things: From Device to Fog and Cloud. Springer Nature, .
Gokul, M. V., & Taclepalli, M. S. (2016). lmplementation of a WiFi based Plug and Sense Device for Dedicated Air Pollution Monitoring using IoT . Online International Conference on Green Engineering and Technologies .
Muhammad Ikhwan Hanif bin Ismail, *. M. (2017). IoT Implementation for Indoor Vertical Farming Watering System. IEEE.
Paulo Novais, J. L. (2019). Ambient Intelligence – Software and Applications –,10th International Symposium on Ambient Intelligence. Springer,.
Wang, Q., Chen, D., Ning Zhang, Z. Q., & Qin, Z. (2017). LACS: A lightweight label-based access control scheme in IoT-based 5G caching context. IEEE Access 5.