An Overall Perspective on Establishing End-to-End Security in Enterprise IoT (E-IoT)

Vidya Rao, K. V. Prema, Shreyas Suresh Rao

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Abstract

With the increase of Internet of Things (IoT) applications, the number of devices communicating over the Internet is also increasing. These devices are generating numerous amounts of sensitive data that are being communicated over an unprotected network. The manufacturers are providing the least preferences for the device-level security due to resource-constrained properties of the IoT devices. The existing research has shown large computational cryptographic solutions that both consume power and occupy more space on the device. Thereby, it is required to develop lightweight cryptographic solutions that are suitable for low-powered resources of IoT applications. In this chapter, a detailed study of various attacks that can be encountered on various layers of IoT architecture is generalized with possible lightweight measures. Also, threat modeling using Microsoft’s threat modeling tool is explained that helps in the early identification of threats in IoT applications. Finally, security practices that should be followed by enterprise IoT are covered.

Original languageEnglish
Title of host publicationEAI/Springer Innovations in Communication and Computing
PublisherSpringer Gabler
Pages81-97
Number of pages17
DOIs
Publication statusPublished - 2020

Publication series

NameEAI/Springer Innovations in Communication and Computing
ISSN (Print)2522-8595
ISSN (Electronic)2522-8609

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Information Systems
  • Health Informatics

Fingerprint

Dive into the research topics of 'An Overall Perspective on Establishing End-to-End Security in Enterprise IoT (E-IoT)'. Together they form a unique fingerprint.

Cite this