<´╗┐img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=112631&fmt=gif" />


A Survey of Information Security Implementations for the Internet of Things

To fully realize the opportunities of the Internet of Things (IoT), a strict and reliable approach to security is essential. Different devices, systems, and industries have varying security requirements and often require a custom lens. This paper will provide an introductory-level explanation of the CIA triad implementations based on confidentiality, integrity, and availability, and how each relates to an IoT device and system.


  • Security implementations of the CIA triad as applied to IoT
  • How these implementations can be used to defend against various attacks
  • How a defense-in-depth approach is used to form three recommended levels of security that can be implemented for an IoT device and system