mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-25 04:10:17 +00:00
29 lines
3.4 KiB
Markdown
29 lines
3.4 KiB
Markdown
# Wireless IoT Protocols and Implementations
|
|
|
|
| Protocol | Frequency | Range | Data Rate | Security Features | Common Use Cases |
|
|
|---------------------|----------------|-----------------|------------------|----------------------------------------------------------------|------------------------------------------|
|
|
| Zigbee | 2.4 GHz | 10-100 meters | 250 kbps | AES-128 encryption, application layer security | Home automation, smart energy |
|
|
| Z-Wave | 800-900 MHz | 30-100 meters | 9.6-100 kbps | AES-128 encryption, application layer security | Home automation, healthcare |
|
|
| Wi-Fi | 2.4 & 5 GHz | 50+ meters | Up to 6000 Mbps | WPA3, WPA2, WEP, AES encryption, Enterprise security options | High bandwidth applications, home networks |
|
|
| Bluetooth (incl. BLE) | 2.4 GHz | 1-100 meters | 1-3 Mbps (BLE) | AES-128 encryption, application layer security, ECDH for key exchange | Wearables, healthcare, smart homes |
|
|
| LoRaWAN | Various (sub-GHz) | 2-5 km (urban), 15+ km (rural) | 0.3-50 kbps | AES-128 encryption, end-to-end encryption | Smart cities, agricultural sensors |
|
|
| Sigfox | Sub-GHz | 30-50 km | 100-600 bps | AES-128 encryption | Low-power applications, asset tracking |
|
|
| NB-IoT | Sub-GHz | 1-10 km | 250 kbps | E2E encryption, SIM-based security, secure boot | Smart meters, smart city infrastructure |
|
|
| LTE-M (LTE Cat-M1) | Sub-GHz | 1-10 km | 1 Mbps | E2E encryption, SIM-based security, secure boot | Wearables, vehicle tracking |
|
|
| Thread | 2.4 GHz | 10-30 meters | 250 kbps | AES encryption, secure mesh networking, device authentication | Connected home, security systems |
|
|
| MQTT | - | Depends on network | Depends on network | TLS/SSL support, username/password, ACLs for permissions | Remote sensors, home automation, messaging |
|
|
| CoAP | - | Depends on network | Depends on network | DTLS for security, supports TLS for TCP | Smart homes, energy management |
|
|
|
|
- **Frequency**: The radio frequency at which the protocol operates.
|
|
- **Range**: The typical communication range between devices.
|
|
- **Data Rate**: The maximum achievable data transmission speed.
|
|
- **Security Features**:
|
|
- **AES-128 encryption**: A symmetric key encryption standard that provides good security.
|
|
- **WPA3/WPA2**: Security protocols for Wi-Fi networks, with WPA3 being the latest and most secure.
|
|
- **ECDH**: Elliptic Curve Diffie-Hellman, a secure key exchange protocol.
|
|
- **SIM-based security**: Utilizes the SIM card for secure key storage and authentication.
|
|
- **Secure boot**: Ensures the device boots using only software that is trusted by the device manufacturer.
|
|
- **TLS/SSL**: Protocols for securing data communications over networks.
|
|
- **DTLS**: Datagram Transport Layer Security, a derivative of TLS designed for datagram protocols.
|
|
- **ACLs**: Access Control Lists, which specify which users or system processes are granted access to objects.
|
|
|