Skip to Main Content

Internet of Things (IoT): Internet of Things Security

IoT Security

IoT devices collect huge amounts of data about their users (Naveen and Kounte, 2019). These data must be confidential, available, and unaltered because a security breach may have a higher negative impact ( Ashraf et al, 2022). Confidentiality involves putting measures in place to prevent wrong or unauthorized people from getting access to the data generated from the IoT device (Warsinske et al, 2019). Secondly, availability is concerned with ensuring that data collected is stored in a way that will be easy to access and use whenever the need arises. Data Integrity has to do with ensuring that the data collected is not altered or changed by an unauthorized person (Warsinske et al, 2019). Cyber attack is on the rise and as a result, it is essential to pay attention to IoT security (Warsinske et al, 2019). For example, a smartwatch may collect information about the health of its user. This information can be altered by a hacker. The user's physician may use the altered information to prescribe medication for the user. This may have a negative impact on the user's health since the wrong information was used.  IoT security, therefore, refers to the measures put in place to protect data generated by IoT devices that are connected to the cloud from being exposed to unauthorized entities. 

Ashraf, A. M., Elmedany, W. M., & Sharif, M. S. (2022, August). Secure iot data transmission at physical layer using rc6 encryption technique. In 2022 9th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 307-315). IEEE.

Naveen, S., & Kounte, M. R. (2019, December). Key technologies and challenges in IoT edge computing. In 2019 Third international conference on I-SMAC (IoT in social, mobile, analytics and cloud)(I-SMAC) (pp. 61-65). IEEE.

Warsinske, J., Henry, K., Graff, M., Hoover, C., Malisow, B., Murphy, S., ... & Vasquez, M.(2019). The Official (ISC) 2 Guide to the CISSP CBK Reference. John Wiley & Sons.