Security is one of the main “IoT Standards” that a lot of groups, communities, vendors and manufacturers are currently tackling. The IoT is creating a vast amount of opportunities for sensors and devices to be created and used, but also creating a vast amount of security areas that need to be considered.
Due to the possible combinations of sensors and uses available for IoT devices this makes having a single standard or solution impossible. Instead security will evolve in a layered approach with the ability to be interlinked within a device in order to provide the layer of security needed. As well as combining these layers it is also important that any security applied is up to date and if possible has the ability to be kept up to date with latest patches and updates.
Below is an illustration of some possible layers that need to be considered when looking into designing an IoT device.
I will delve a bit deeper into each of these areas in following blog posts (Links below updated as each post is written)
Pingback: IoT Device Security Considerations and Security Layers – Power Source | Max Hemingway
Pingback: IoT Device Security Considerations and Security Layers – Chipset | Max Hemingway
Pingback: IoT Device Security Considerations and Security Layers – Storage/Data | Max Hemingway
Pingback: IoT Device Security Considerations and Security Layers – Sensor/Instruments | Max Hemingway
Pingback: IoT Device Security Considerations and Security Layers – Operating System | Max Hemingway
Pingback: IoT Device Security Considerations and Security Layers – Applications | Max Hemingway
Pingback: IoT Device Security Considerations and Security Layers – Device/Application API’s | Max Hemingway
Pingback: IoT Device Security Considerations and Security Layers – User Interface | Max Hemingway
Pingback: IoT Device Security Considerations and Security Layers –Access Control & Authentication | Max Hemingway
Pingback: IoT Device Security Considerations and Security Layers – Encryption | Max Hemingway
Pingback: IoT Device Security Considerations and Security Layers – Network Communication | Max Hemingway
Pingback: An A-Z Guide to being an Architect | Max Hemingway
Pingback: IoT Standards & Manifesto | Max Hemingway
Pingback: A-Z of Digital – I is for IoT | Max Hemingway
Pingback: I is for IoT – DXC Blogs
Pingback: A-Z of Digital – L is for Legal | Max Hemingway
Pingback: L is for legal – DXC Blogs
Pingback: A-Z of Digital – Y is for Yottabyte | Max Hemingway
Pingback: Y is for yottabyte – DXC Blogs
Pingback: Smart Home – How many Hubs? | Max Hemingway