TY - CHAP
T1 - An Overall Perspective on Establishing End-to-End Security in Enterprise IoT (E-IoT)
AU - Rao, Vidya
AU - Prema, K. V.
AU - Rao, Shreyas Suresh
PY - 2020
Y1 - 2020
N2 - With the increase of Internet of Things (IoT) applications, the number of devices communicating over the Internet is also increasing. These devices are generating numerous amounts of sensitive data that are being communicated over an unprotected network. The manufacturers are providing the least preferences for the device-level security due to resource-constrained properties of the IoT devices. The existing research has shown large computational cryptographic solutions that both consume power and occupy more space on the device. Thereby, it is required to develop lightweight cryptographic solutions that are suitable for low-powered resources of IoT applications. In this chapter, a detailed study of various attacks that can be encountered on various layers of IoT architecture is generalized with possible lightweight measures. Also, threat modeling using Microsoft’s threat modeling tool is explained that helps in the early identification of threats in IoT applications. Finally, security practices that should be followed by enterprise IoT are covered.
AB - With the increase of Internet of Things (IoT) applications, the number of devices communicating over the Internet is also increasing. These devices are generating numerous amounts of sensitive data that are being communicated over an unprotected network. The manufacturers are providing the least preferences for the device-level security due to resource-constrained properties of the IoT devices. The existing research has shown large computational cryptographic solutions that both consume power and occupy more space on the device. Thereby, it is required to develop lightweight cryptographic solutions that are suitable for low-powered resources of IoT applications. In this chapter, a detailed study of various attacks that can be encountered on various layers of IoT architecture is generalized with possible lightweight measures. Also, threat modeling using Microsoft’s threat modeling tool is explained that helps in the early identification of threats in IoT applications. Finally, security practices that should be followed by enterprise IoT are covered.
UR - http://www.scopus.com/inward/record.url?scp=85090531480&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85090531480&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-44407-5_4
DO - 10.1007/978-3-030-44407-5_4
M3 - Chapter
AN - SCOPUS:85090531480
T3 - EAI/Springer Innovations in Communication and Computing
SP - 81
EP - 97
BT - EAI/Springer Innovations in Communication and Computing
PB - Springer Gabler
ER -