Presentation + Paper
3 May 2018 Adopting cyber security practices in Internet of Things: a review
Author Affiliations +
Abstract
Internet of Things (IoT), an emerging network of physical objects, acts as catalyst for the future connected world. It is estimated that there will be around 50 billion connected objects by year 2020. An IoT enabled connected world improves the way human live and interact with surroundings. Through IoT valuable information and services are available to humans on demand and in real time. But these information and services may also cause harm at certain level if not thoroughly observed. With the advent of IoT, the future of the connected world will face new types of security threats since more than half of the total connected objects today are exposed to such threats and vulnerability and this number may increase as more devices are getting connected to internet. Security is the major concern in designing IoT systems since the data collected by IoT objects may be critical and also data transmitted and processed by overall IoT system may be sensitive and may lead to issues with safety, privacy, authorization and authenticity etc. Therefore while taking advantage of IoT we must also consider the ways, to the highest possible degree, to prevent the future IoT connected world from harming us. Cyber security in IoT deals with protecting connected objects for data authorization, authentication, tempering and losses as well as identifying potential risks to the system. This paper provides a brief review on how to adopt security practices in designing IoT systems to make them secure and safe.
Conference Presentation
© (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Priti Maheshwary, Timothy Malche, Christos Grecos, and Mukul Shirvaikar "Adopting cyber security practices in Internet of Things: a review", Proc. SPIE 10643, Autonomous Systems: Sensors, Vehicles, Security, and the Internet of Everything, 1064305 (3 May 2018); https://doi.org/10.1117/12.2304704
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Network security

Clouds

Sensors

Control systems

Internet

Data processing

RELATED CONTENT

A design of high speed railway internet of things security...
Proceedings of SPIE (September 27 2022)
IoT-based flood embankments monitoring system
Proceedings of SPIE (August 07 2017)
Micromanaging the IoT space
Proceedings of SPIE (May 02 2017)
ISA for the internet of tactical things
Proceedings of SPIE (May 04 2017)

Back to Top