IoT – Common security in wireless communication Technologies

TechnologiesSecurityDrawbacks
ZigBeeThree types of security: Control and managing who or what can view or use resources. Encryption Integrity
It provides security by assigning a mandatory network key to each device for proper authorization.
Network key assigned to different devices are fixed and cannot be changed later.
BluetoothIt provides encryption of data between sender & receiver.It has some common threats like blue jacking & bluesnarfing.

Blue Jacking: Sending unsolicited message in the form of business card, messages, or pictures. It does not steal any information from recipient device.

Bluesnarfing: It is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to calendars, contact lists, emails and text messages, and on some phones, users can copy pictures and private videos.
Radio Frequency Identification (RFID)It provides encryption of data supporting AES & DES symmetric algorithm.– It does not provide security to read information from tags because tags give information without verifying the authentication of reader. The attacker can make his own reader to collect
information.

– Even attacker can change the cipher text that leads to data integrity issue.
Wireless Sensor Network(WSN)It provides encryption of data.There are several attacks in WSN, such as
– Denial of Service (DOS)
– Distributed DOS (DDOS)
Wireless Fidelity (Wi-Fi)Authentication and Authorization mechanism– There is no proper encryption mechanism that may cause to change the message by attacker.

– Eavesdropping & monitoring data
Table 1.0