Abstract
Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, and privacy are not addressed well. Most IoT devices having constraints in computational and operational capabilities are a threat to security and privacy, also prone to cyber-attacks. This study presents a CIA triad-based information security implementation for the four-layer architecture of the IoT devices. An overview of layer-wise threats to the IoT devices and finally suggest CIA triad-based security techniques for securing the IoT devices.
Highlights
Some application domains well define the IoT (Internet of Things) comprising health, agriculture, home, supply chain and manufacturing, city and transportation utilities
The architecture has been suggested with an Edge Network layer which is responsible for the collection, transmission, and processing of the data from the IoT devices
Information Security is the major concern for IoT devices and applications
Summary
Some application domains well define the IoT (Internet of Things) comprising health, agriculture, home, supply chain and manufacturing, city and transportation utilities. In these domains, physical devices are connected via Internet [1]. As the size of the IoT network exponentially increases the security and privacy issues of IoT applications come to light [13]. These consist of wireless sensors, RFID tags, and many more smart devices. The huge number of data and various quantities of new IoT devices create a significant space for information security and privacy concerns.
Full Text
Topics from this Paper
Internet Of Things Devices
Internet Of Things
Advent Of Internet Of Things
Internet Of Things Fields
Information Security
+ Show 5 more
Create a personalized feed of these topics
Get StartedTalk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Similar Papers
Jun 13, 2022
May 21, 2017
Jan 1, 2017
International Journal of Advanced Research in Science, Communication and Technology
May 20, 2022
Mobile Information Systems
Sep 16, 2022
IEEE Transactions on Mobile Computing
Apr 1, 2022
Jun 9, 2022
Journal of Sensor and Actuator Networks
Nov 21, 2022
IEEE Access
Jan 1, 2020
Jan 1, 2017
Aug 1, 2018
International Journal of Interactive Mobile Technologies (iJIM)
International Journal of Interactive Mobile Technologies (iJIM)
Nov 27, 2023
International Journal of Interactive Mobile Technologies (iJIM)
Nov 27, 2023
International Journal of Interactive Mobile Technologies (iJIM)
Nov 27, 2023
International Journal of Interactive Mobile Technologies (iJIM)
Nov 27, 2023
International Journal of Interactive Mobile Technologies (iJIM)
Nov 27, 2023
International Journal of Interactive Mobile Technologies (iJIM)
Nov 27, 2023
International Journal of Interactive Mobile Technologies (iJIM)
Nov 27, 2023
International Journal of Interactive Mobile Technologies (iJIM)
Nov 27, 2023
International Journal of Interactive Mobile Technologies (iJIM)
Nov 15, 2023
International Journal of Interactive Mobile Technologies (iJIM)
Nov 15, 2023