DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/xmlui/handle/123456789/8724
Title: An Overall Perspective on Establishing End-to-End Security in Enterprise IoT (E-IoT)
Authors: Rao, Shreyas Suresh
Keywords: Computer Science
Elliptic curve cryptography
Layered architecture
Security threats and attacks
Threat modeling tools
Issue Date: Jun-2020
Publisher: Springer
Abstract: With the increase of Internet of Things (IoT) applications, the number of devices communicating over the Internet is also increasing. These devices are generating numerous amounts of sensitive data that are being communicated over an unprotected network. The manufacturers are providing the least preferences for the device-level security due to resource-constrained properties of the IoT devices. The existing research has shown large computational cryptographic solutions that both consume power and occupy more space on the device. Thereby, it is required to develop lightweight cryptographic solutions that are suitable for low-powered resources of IoT applications. In this chapter, a detailed study of various attacks that can be encountered on various layers of IoT architecture is generalized with possible lightweight measures. Also, threat modeling using Microsoft’s threat modeling tool is explained that helps in the early identification of threats in IoT applications. Finally, security practices that should be followed by enterprise IoT are covered.
URI: https://link.springer.com/chapter/10.1007/978-3-030-44407-5_4
http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8724
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.