Download this chapter (PDF)
Emergence of measures for secure Internet of Things

The Internet of Things (IoT) is here to stay, and it is revolutionising industries by improving efficiency and providing more insights. Yet, it faces significant security challenges and risks related to, for example, identification, authentication, and ownership of ‘smart’ devices, such as autonomous drones.

Over the last decade, IoT developers and vendors have neglected their responsibility for security updates throughout the product lifetime, creating cybersecurity gaps within organisations.

To mitigate such risks, security solutions, such as endpoint protection, are being developed. In addition, new legislation, like the Cyber Resilience Act, will force IoT developers and vendors to include security updates for any product’s lifetime.

Impact

education

Education

  • Professional degrees like system engineering integrate IoT and its security aspects into the curriculum. However, the application of IoT in educational methods focuses less on digital technology, such as providing instant feedback. Enabling personalised learning remains limited.
Research

Research

  • The secure implementation of IoT can also contribute to the collection of data for scientific research (e.g. via devices and wearables).
  • IoT and the security of IoT is being investigated in a wide variety of applications with higher education research institutions. This includes, for example, privacy-preserving and secure protocols for healthcare wearables (IoMedicalT), smart traffic management systems, and developing models that detect and classify IoT attacks.
Operations

Operations

  • IoT is often overlooked by IT security operations, despite the significant increase of its attack surface area. It is therefore important that IT security operations regain control of their hidden IoT assets, facilitate the use of secure IoT, as well as educate their employees and students about the security risks associated with IoT interactions (awareness). Institutions are advised to isolate IoT networks, use dedicated servers, and implement governance frameworks to ensure secure IoT adoption.
More info about Cybersecurity?
Visit surf.nl
Link SURF icoon