Verified Document

Security Challenges Represented By The IoT Research Paper

Related Topics:

The Future of IoT with PKI & End-Point Device Management

Thanks to the Internet of Things (IoT) people and places and devices are now more connected than ever before. People can communicate with one another from anywhere in the world; they can control their homes and property with their smart phones no matter where they are at present. These devices can be used in residential and commercial and industrial settings, and from homes to supply chain management they are finding utility. However, as these tools become more popular, security issues also arise. Public Key Infrastructure (PKI) and end-point device management have become important tools for addressing the security concerns that accompany IoT.

PKI in IoT

PKI is not a new concept, but its application in the IoT is revolutionary (Pieroni et al., 2020). PKI operates on asymmetric cryptography, where two keys, one public and the other private, are used for permissions. The public key is available to everyone, while the private...

For example, one may have something as simple as a smart thermostat or a connected car that one can only reach remotely. These devices need to communicate with other devices or central servers securely...
…to once they are connected. This dual-prong approach to security is helpful, for example, if there is a situation where a smart meter is compromised after connecting to the network. PKI would have ensured its authenticity prior to connection, but post-connection malicious influences were spotted by end-point management tools. Thanks to them corrective action could be taken.

Conclusion

The future of IoT really depends on strong security frameworks. PKI and end-point device management offer a robust take on how to solve the security challenges that IoT presents to users all over the world. The more that the two-prong approach of PKI and end-point device management is used, the more secure networks, devices,…

Sources used in this document:

References

Pieroni, A., Scarpato, N., & Felli, L. (2020). Blockchain and IoT convergence—a systematicsurvey on technologies, protocols and security. Applied Sciences, 10(19), 6749.

Omolara, A. E., Alabdulatif, A., Abiodun, O. I., Alawida, M., Alabdulatif, A., & Arshad, H.

(2022). The internet of things security: A survey encompassing unexplored areas and new insights. Computers & Security, 112, 102494.

Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now