A Survey of Information Security Implementations for the Internet of Things
To fully realize the opportunities of the Internet of Things (IoT), a strict and reliable approach to security is essential. Different devices, systems, and industries have varying security requirements and often require a custom lens. This paper will provide an introductory-level explanation of the CIA triad implementations based on confidentiality, integrity, and availability, and how each relates to an IoT device and system.
- Security implementations of the CIA triad as applied to IoT
- How these implementations can be used to defend against various attacks
- How a defense-in-depth approach is used to form three recommended levels of security that can be implemented for an IoT device and system