h4cker/iot_hacking/wireless_iot.md
2023-11-08 16:09:36 -05:00

3.4 KiB

Wireless IoT Protocols and Implementations

Protocol Frequency Range Data Rate Security Features Common Use Cases
Zigbee 2.4 GHz 10-100 meters 250 kbps AES-128 encryption, application layer security Home automation, smart energy
Z-Wave 800-900 MHz 30-100 meters 9.6-100 kbps AES-128 encryption, application layer security Home automation, healthcare
Wi-Fi 2.4 & 5 GHz 50+ meters Up to 6000 Mbps WPA3, WPA2, WEP, AES encryption, Enterprise security options High bandwidth applications, home networks
Bluetooth (incl. BLE) 2.4 GHz 1-100 meters 1-3 Mbps (BLE) AES-128 encryption, application layer security, ECDH for key exchange Wearables, healthcare, smart homes
LoRaWAN Various (sub-GHz) 2-5 km (urban), 15+ km (rural) 0.3-50 kbps AES-128 encryption, end-to-end encryption Smart cities, agricultural sensors
Sigfox Sub-GHz 30-50 km 100-600 bps AES-128 encryption Low-power applications, asset tracking
NB-IoT Sub-GHz 1-10 km 250 kbps E2E encryption, SIM-based security, secure boot Smart meters, smart city infrastructure
LTE-M (LTE Cat-M1) Sub-GHz 1-10 km 1 Mbps E2E encryption, SIM-based security, secure boot Wearables, vehicle tracking
Thread 2.4 GHz 10-30 meters 250 kbps AES encryption, secure mesh networking, device authentication Connected home, security systems
MQTT - Depends on network Depends on network TLS/SSL support, username/password, ACLs for permissions Remote sensors, home automation, messaging
CoAP - Depends on network Depends on network DTLS for security, supports TLS for TCP Smart homes, energy management
  • Frequency: The radio frequency at which the protocol operates.
  • Range: The typical communication range between devices.
  • Data Rate: The maximum achievable data transmission speed.
  • Security Features:
    • AES-128 encryption: A symmetric key encryption standard that provides good security.
    • WPA3/WPA2: Security protocols for Wi-Fi networks, with WPA3 being the latest and most secure.
    • ECDH: Elliptic Curve Diffie-Hellman, a secure key exchange protocol.
    • SIM-based security: Utilizes the SIM card for secure key storage and authentication.
    • Secure boot: Ensures the device boots using only software that is trusted by the device manufacturer.
    • TLS/SSL: Protocols for securing data communications over networks.
    • DTLS: Datagram Transport Layer Security, a derivative of TLS designed for datagram protocols.
    • ACLs: Access Control Lists, which specify which users or system processes are granted access to objects.