Security analysis of IoT networks and platforms

Stephen Ugwuanyi, James Irvine

Research output: Contribution to conferencePaperpeer-review

7 Citations (Scopus)
84 Downloads (Pure)

Abstract

With the recent increase in the adoption of Internet of Things (IoT) technology globally, cybersecurity-related issues have been raised, particularly with the limitations of IoT devices, privacy and other security standards guiding IoT development as wireless technology evolves. With the enterprise and the massive IoT market expected to reach $7.6 B and $1.2 B in 2024 respectively, according to Gartner, and several operational vertical IoT use cases and platforms experiencing cyber vulnerabilities. Based on the findings from our recent LPWANs IoT testbeds and their operational performance in certain use case scenarios, this paper summarizes the key wireless technology security requirements for IoT deployments. We first compare the security requirements of legacy and emerging IoT technologies as it relates to smart city applications and examined the effectiveness of the existing countermeasure opportunities as it affects the overall system performance in critical and non-critical machine type communications. We concluded by recommending countermeasures opportunities and frameworks to secure industrial IoT platforms to cope with future cybersecurity vulnerabilities
Original languageEnglish
Pages1-6
Number of pages6
DOIs
Publication statusPublished - 25 Dec 2020
EventIEEE International Symposium on Networks, Computers and Communications - College de Maisonneuve, Montreal, Canada
Duration: 20 Oct 202022 Oct 2020
http://www.isncc-conf.org/home-1

Conference

ConferenceIEEE International Symposium on Networks, Computers and Communications
Abbreviated title(ISNCC)
Country/TerritoryCanada
CityMontreal
Period20/10/2022/10/20
Internet address

Keywords

  • deployment
  • industrial
  • Internet of things
  • narrowband
  • platforms
  • security

Fingerprint

Dive into the research topics of 'Security analysis of IoT networks and platforms'. Together they form a unique fingerprint.

Cite this