ThingsSecurity is one of the main “IoT Standards” that a lot of groups, communities, vendors and manufacturers are currently tackling. The IoT is creating a vast amount of opportunities for sensors and devices to be created and used, but also creating a vast amount of security areas that need to be considered.

Due to the possible combinations of sensors and uses available for IoT devices this makes having a single standard or solution impossible. Instead security will evolve in a layered approach with the ability to be interlinked within a device in order to provide the layer of security needed. As well as combining these layers it is also important that any security applied is up to date and if possible has the ability to be kept up to date with latest patches and updates.

Below is an illustration of some possible layers that need to be considered when looking into designing an IoT device.

IoT Device Security

I will delve a bit deeper into each of these areas in following blog posts (Links below updated as each post is written)

22 responses to “IoT Device Security Considerations and Security Layers”

  1. […] on from my post on IoT Device Security Considerations and Security Layers the subject of this blog post is to look at the Power Source […]

    Like

  2. […] the theme of IoT Security as first discussed in my post IoT Device Security Considerations and Security Layers, the next layer to look at is the […]

    Like

  3. […] next layer to cover in my blog series on IoT Device Security Considerations and Security Layers is that of Storage and […]

    Like

  4. […] in the blog series “IoT Device Security Considerations and Security Layers” is Sensors and […]

    Like

  5. […] post in the series on “IoT Device Security Considerations and Security Layers“, this time looking at Operating […]

    Like

  6. […] further my series on “IoT Device Security Considerations and Security Layers” next in the stack is the […]

    Like

  7. […] my series on “IoT Device Security Considerations and Security Layers” next in the stack is the Device/Application […]

    Like

  8. […] next area in my series on IoT Device Security Considerations and Security Layers is the User […]

    Like

  9. […] next post in my IoT Series on IoT Device Security Considerations and Security Layers is on Access Control and […]

    Like

  10. […] next layer to cover in my blog series on IoT Device Security Considerations and Security Layers is that of […]

    Like

  11. […] my series on “IoT Device Security Considerations and Security Layers” next in the stack is Network […]

    Like

  12. […] and electronics. This allows the items to be managed, controlled and reported on. My blog posts on IoT Device Security Considerations and Security Layers goes into more detail on this […]

    Like

  13. […] definition of secure does need to be defined. As outlined in a previous set of blog posts, “IoT Device Security Considerations and Security Layers“, this is a vast area to design and build […]

    Like

  14. […] Blog Series on:  IoT Device Security Considerations and Security Layers.  […]

    Like

  15. […] Blog Series on:  IoT Device Security Considerations and Security Layers.  […]

    Like

  16. […] IoT Device Security Considerations and Security Layers […]

    Like

  17. […] IoT Device Security Considerations and Security Layers […]

    Like

  18. […] IoT Device Security Considerations and Security Layers […]

    Like

  19. […] IoT Device Security Considerations and Security Layers […]

    Like

  20. […] Blog Series on:  IoT Device Security Considerations and Security Layers.  […]

    Like

  21. […] Blog Series on:  IoT Device Security Considerations and Security Layers.  […]

    Like

  22. […] Blog Series on:  IoT Device Security Considerations and Security Layers.  […]

    Like

Leave a reply to IoT Device Security Considerations and Security Layers – Chipset | Max Hemingway Cancel reply

Trending