@inbook{78d8c7827d434d20a3d9dc5ec4374ef3,
title = "An Overall Perspective on Establishing End-to-End Security in Enterprise IoT (E-IoT)",
abstract = "With the increase of Internet of Things (IoT) applications, the number of devices communicating over the Internet is also increasing. These devices are generating numerous amounts of sensitive data that are being communicated over an unprotected network. The manufacturers are providing the least preferences for the device-level security due to resource-constrained properties of the IoT devices. The existing research has shown large computational cryptographic solutions that both consume power and occupy more space on the device. Thereby, it is required to develop lightweight cryptographic solutions that are suitable for low-powered resources of IoT applications. In this chapter, a detailed study of various attacks that can be encountered on various layers of IoT architecture is generalized with possible lightweight measures. Also, threat modeling using Microsoft{\textquoteright}s threat modeling tool is explained that helps in the early identification of threats in IoT applications. Finally, security practices that should be followed by enterprise IoT are covered.",
author = "Vidya Rao and Prema, {K. V.} and Rao, {Shreyas Suresh}",
note = "Publisher Copyright: {\textcopyright} 2020, Springer Nature Switzerland AG.",
year = "2020",
doi = "10.1007/978-3-030-44407-5_4",
language = "English",
series = "EAI/Springer Innovations in Communication and Computing",
publisher = "Springer Gabler",
pages = "81--97",
booktitle = "EAI/Springer Innovations in Communication and Computing",
address = "Germany",
}