The goal in this post is to give an overview of the security goal in IoT applications (CIA Model) and see if MQTT and CoAP protocols satisfy this goal. Due to rush to the market security in IoT devices often neglected. A small number of IoT devices support some protection and security which most of
This article tries to clarify and describe how insecure physical layer can cause insecurity in other layers and consequently causing different security issues. I will go through that by describing a very simple example using Mongoose OS. I try to describe the security aspects that we should consider whenever we use Mongoose OS and are
This post is the second part of the last post and will describe the architecture along with characteristics of Malware especially Mirai and Hajime. Characteristics of IoT malware As mentioned before, the IoT device should get the Malware in order to participate in DDoS attacks. Most of the malwares are Linux based and has limited
The goal in this post and the next one is to describe Distributed Danial of Service attack, its architecture, and the most common Malware for DDoS in IoT devices. What is Danial of Service One of the most popular attacks is the Denial of Service attack in which the attacker tries to make the server
In this post series, I’m going to talk about security in IoT devices and I try to clarify the following aspects and questions about them: Security for IoT devices. Motivation and why people should care about the security of their IoT device or more general, for every device that can connect to the Internet? IoT
According to Wikipedia, Edge Computing is a method of optimizing applications or cloud computing systems by taking some portion of an application, its data, or services away from one or more central nodes (the “core”) to the other logical extreme (the “edge”) of the Internet which makes contact with the physical world or end users
In part I, I’ve described Serverless Computing in detail with an example. In this post, I’ll start by describing serverless platforms and toolkits and continue with comparing some of them to each other. B. Serverless Platform Cloud providers offer Serverless platforms which are ready to develop and deploy a serverless application. Most popular platforms are
Serverless computing is changing the way of computation in the cloud and even in the network edges. Companies are spending time and money to maintain their servers and related software in order to make their business application up and running for their users. Traditional server-based computation slows down companies to go to the market which