Cyber Security Techniques for Internet of Things (IoT)

Cyber Security Techniques for Internet of Things (IoT)

Binod Kumar, Sheetal B. Prasad
Copyright: © 2020 |Pages: 26
DOI: 10.4018/978-1-7998-2253-0.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The purpose of the cyber security policy is to provide guidelines on how to secure public and private resources from cyberattacks. IoT devices are having challenges managing the personal information they collect and helps to people understand that information is managed by a system. Digital twins enhance development by allowing developers to directly manipulate the device's abstract version using programming instructions. It is required to think about possible attack vectors when tuning cyber security for the IoT environment concerns. So, a security administrator is required to think the about possible vulnerabilities of the environment. Supervision and protocols must also be developed for suppliers, manufacturers, vendors, etc. The deployment of consumer understanding to make best use of “smart” strategy, using their own “smart” minds is required. There is a need for a framework or other types of guidance for assessing IoT cyber security to provide an informed approach to securing devices and the ecosystems in which they are set up.
Chapter Preview
Top

Internet Of Things

The Internet of Things is a network of physical objects that contain embedded software to communicate and sensor, or to interact with its internal or outside environment. IoT is a forward-looking Internet architecture that integrates objects and devices into sensor and computer energy to communicate with one another. While the initial IoT idea excessively emphasizes machine-to-machine communication, the real change that underlies this is an increasingly indirect diversification of people-to-people communication. Machines can interact ultimately, but until now, this phenomenon has neither become universal nor includes all kinds of networks; even if machines can connect to one another, they stay as human communication tools (Miller, 2016).

The increasing networking capability of home, mobile and portable technology, cars and supply chains and even urban infrastructure machines and daily devices provides a wide array of business and customer satisfaction possibilities. Most IoT devices are using sensor-based technologies in which the sensors identify, measure or transfer data to a given device or server to analyze the data in order to generate the “Information” for the user and so on. The sensors also function as information collectors in company terms: cloud computing is a data storage and analysis platform, and Big Data Analytics converts this raw information into information or insights (Kessel, 2015).

Complete Chapter List

Search this Book:
Reset