IoT Security Challenges and Mitigations: An Introduction

12/29/2021
by   Stuart Millar, et al.
0

The use of IoT in society is perhaps already ubiquitous, with a vast attack surface offering multiple opportunities for malicious actors. This short paper first presents an introduction to IoT and its security issues, including an overview of IoT layer models and topologies, IoT standardisation efforts and protocols. The focus then moves to IoT vulnerabilities and specific suggestions for mitigations. This work's intended audience are those relatively new to IoT though with existing network-related knowledge. It is concluded that device resource constraints and a lack of IoT standards are significant issues. Research opportunities exist to develop efficient IoT IDS and energy-saving cryptography techniques lightweight enough to reasonably deploy. The need for standardised protocols and channel-based security solutions is clear, underpinned by legislative directives to ensure high standards that prevent cost-cutting on the device manufacturing side.

READ FULL TEXT
research
10/02/2020

Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey

With the advent of advanced technology, IoT introduces a vast number of ...
research
09/18/2018

Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities

Recent advances in Internet of Things (IoT) have enabled myriad domains ...
research
04/03/2023

Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions

The growth in the use of small sensor devices, commonly known as the Int...
research
06/28/2023

BLEND: Efficient and blended IoT data storage and communication with application layer security

Many IoT use cases demand both secure storage and secure communication. ...
research
09/12/2020

oT-Flock: An Open-source Framework for IoT Traffic Generation

Network traffic generation is one of the primary techniques that is used...
research
04/26/2020

Performance Analysis of the Hybrid IoT Security Model of MQTT and UMA

IoT applications are promising for future daily activities; therefore, t...
research
04/17/2019

Performance study of ABC scheme in an IoT context: the case of I2PA, Idemix and U-prove

IoT has lots of benefits. However, when tackling issues about user's pri...

Please sign up or login with your details

Forgot password? Click here to reset