A Survey of Information Security Implementations for the Internet of Things

To fully realize the opportunities of the Internet of Things (IoT), a strict and reliable approach to security is essential. Different devices, systems, and industries have varying security requirements and often require a custom lens. This paper will provide an introductory-level explanation of the CIA triad implementations based on confidentiality, integrity, and availability, and how each relates to an IoT device and system.

LEARN

  • Security implementations of the CIA triad as applied to IoT
  • How these implementations can be used to defend against various attacks
  • How a defense-in-depth approach is used to form three recommended levels of security that can be implemented for an IoT device and system
Previous
Protect Critical IoT Devices with VxWorks Secure Boot and Secure Loading
Protect Critical IoT Devices with VxWorks Secure Boot and Secure Loading

Hacker attacks and attempts on national critical infrastructure continue to rise. VxWorks® provides essenti...

Next
The RTOS as the Engine Powering IoT Critical Infrastructure
The RTOS as the Engine Powering IoT Critical Infrastructure

Digital transformation offers industrial manufacturers the vision of business advantages and efficiencies t...