| Technologies | Security | Drawbacks |
|---|---|---|
| ZigBee | Three types of security: Control and managing who or what can view or use resources. Encryption Integrity It provides security by assigning a mandatory network key to each device for proper authorization. | Network key assigned to different devices are fixed and cannot be changed later. |
| Bluetooth | It provides encryption of data between sender & receiver. | It has some common threats like blue jacking & bluesnarfing. Blue Jacking: Sending unsolicited message in the form of business card, messages, or pictures. It does not steal any information from recipient device. Bluesnarfing: It is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to calendars, contact lists, emails and text messages, and on some phones, users can copy pictures and private videos. |
| Radio Frequency Identification (RFID) | It provides encryption of data supporting AES & DES symmetric algorithm. | – It does not provide security to read information from tags because tags give information without verifying the authentication of reader. The attacker can make his own reader to collect information. – Even attacker can change the cipher text that leads to data integrity issue. |
| Wireless Sensor Network(WSN) | It provides encryption of data. | There are several attacks in WSN, such as – Denial of Service (DOS) – Distributed DOS (DDOS) |
| Wireless Fidelity (Wi-Fi) | Authentication and Authorization mechanism | – There is no proper encryption mechanism that may cause to change the message by attacker. – Eavesdropping & monitoring data |
Tag Archives: Sigfox
IOT Connectivity Technologies
What are Radio-technologies (Radio frequency Range) used to transfer data among devices?
- Bluetooth-BLE (Bluetooth Low Energy Protocol) Wearable devices generally use it i.e smartwatches, wireless headphones, smartphones etc.
- RFID(Radio Frequency Identification) Primarily used for product information and location retrieval.
- WiFi Medium range wireless data transfer technology.
- ZigBee Wireless technology having IEEE 802.15.4 *mesh network standard, specially designed for low cost and low power IOT devices for reliable and secure data transfer.
- Thread IPv6 based wireless technology having IEEE 802.15.4-2006 *mesh network standard, specially designed for low power IOT devices for reliable and secure data transfer. It enables access services on the cloud as well.
- LoRAWAN(Low Powered Wide Area network) A wireless technology built on top of LoRa radio modulation technique that can be primarily used for IoT devices. AWS IoT core has support for LoRAWAN.
- Sigfox A long range wireless technology designed for low power, low data and low cost data transmission for IoT devices.
- LTE-CatM1(Long Term Evolution Category M1) It is for IoT devices connected directly with the 4G network.
- NB-IoT (Narrow Band Internet of Things) It is 3GPP low power wide area network standard that is compatible with 2G, 3G and other 3GPP standards that are designed for wide area IoT devices connectivity.
Wireless data transfer technologies can be categorized based on range like WiFi, ZigBee and Thread are for medium range data transfer. LoRAWAN, Sigfox, LTE-CatM1 & NB-IoT are for long range data transfer.
*Mesh Network refers to network topology where multiple nodes are directly connected to each other without any hierarchy to efficiently route data.
Note: Low power consumption devices are mostly used in IoT therefore radio- technologies are used accordingly that supports or provide long battery life.. There is always a trade-off between low power consumption and frequent data transfer.