A Survey on Developing Secure IoT Products

Authors

  • Priyang Bhatt Gujarat Technological University, V. V Nagar, Anand , India
  • Bhasker Thaker Dept. of ECE, G H Patel College of Engineering and Technology, V. V Nagar, Anand, India
  • Neel Shah TCR Advanced Engineering Pvt. Ltd., Vadodara, India

Keywords:

IoT, Privacy, Security, Product Development, Secure Design

Abstract

The Internet of Things (IoT) is a vision of a globally interconnected network of various sensors, actuators and embedded systems connected to each other via wired/wireless connections, interacting with the environment and each other to create value. This vision would revolutionize current models and processes in business and daily life. Needless to say being such an impactful concept, security in IoT becomes even more critical than before. In this we paper we survey and highlight some crucial and primary concepts related to IoT Security which have to be incorporated in the IoT system design and development as well as during deployment of the IoT applications.

 

References

Developing Secure Products in the Age of IoT - Internet Of Things, https://electronicsofthings.com/research-articles/developing-secure-products-age-iot/.

Tuhin Borgohain, Uday Kumar, Sugata Sanyal, “Survey of Security and Privacy Issues of Internet of Things,” https://arxiv.org/ftp/arxiv/papers/1501/1501.02211.pdf.

A Whitepaper on The Internet of Things: Reduce Security Risks with Automated Policies, Cisco, https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/security-risks.pdf.

Security Requirements for Embedded Devices – What is Really Needed?, http://www.iconlabs.com/prod/security-requirements-embedded-devices-%E2%80%93-what-really-needed.

Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady, “Security in Embedded Systems:Design Challenges,” http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.586&rep=rep1&type=pdf.

FIPS PUB 140-2.Security Requirements for Cryptographic Modules.Available at http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf.

i.MX 7Solo Processors - Heterogeneous Processing with Arm® Cortex®-A7 and Cortex-M4 cores, https://www.nxp.com/products/processors-and-microcontrollers/applications-processors/i.mx-applications-processors/i.mx-7-processors/i.mx-7solo-processors-heterogeneous-processing-with-arm-cortex-a7-and-cortex-m4-cores:i.MX7S.

i.MX 7Solo Family of Applications Processors Datasheet, https://www.nxp.com/docs/en/data-sheet/IMX7SCEC.pdf.

TrustZone – Arm, https://www.arm.com/products/security-on-arm/trustzone.

TrustZone – Arm Developer, https://developer.arm.com/technologies/trustzone.

Downloads

Published

2018-10-31

How to Cite

[1]
P. Bhatt, B. Thaker, and N. Shah, “A Survey on Developing Secure IoT Products”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 6, no. 5, pp. 41–44, Oct. 2018.

Issue

Section

Survey Article

Similar Articles

<< < 5 6 7 8 9 10 11 12 13 14 > >> 

You may also start an advanced similarity search for this article.