Abstract

The Internet of Things (IoT) is an emerging technology comprising people, smart objects, data, information intelligent devices, etc. It has been estimated that more than 41 billion devices will be connected using IoT technology by 2025. As IoT development is still in its early stage many issues related to it need to be solved. In this new technology which is very popular commercially, trust and security are the keys to future success. This can be achieved by end-to-end security approaches by using encryption to protect consumers’ data without affecting the users’ experience and revenue of the business owner. Because of the heterogeneity and complexity of the technology, the security vulnerabilities are unique in today’s IoT networks. The existing risk framework is not suitable for the new risks generated through the IoT systems. The cyber-security policy provides the guidelines for securing private and public data from cyber-attacks. To manage these data in IoT is a challenging task because IoT network doesn’t follow characteristics of the traditional network. IoT network is formed of resource-constrained devices with limited memory, processing power, size, bandwidth, etc. Due to the growth in the threat of cyber-attacks, cyber-security has become one of the most important areas in IoT. Cyber-security for IoT is important to reduce the risk for users and organizations by protecting IoT privacy and security. For IoT security management, new cyber-security tools and technologies must be provided as traditional tools cannot be directly used for IoT networks. There are limitations to an effective IoT cyber risk management framework. This book chapter is divided into three sections. The first section discusses the security issues in IoT, the second section discusses possible cyber-attacks in IoT network and the third section discusses the need of cyber-security in IoT.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.