Home / Papers / Cyber Security Techniques for Internet of Things (IoT)

Cyber Security Techniques for Internet of Things (IoT)

88 Citations2020
B. Kumar, Sheetal B. Prasad
journal unavailable

There is a need for a framework or other types of guidance for assessing IoT cyber security to provide an informed approach to securing devices and the ecosystems in which they are set up.

Abstract

The purpose of the cyber security policy is to provide guidelines on how to secure public and private resources from cyberattacks. IoT devices are having challenges managing the personal information they collect and helps to people understand that information is managed by a system. Digital twins enhance development by allowing developers to directly manipulate the device's abstract version using programming instructions. It is required to think about possible attack vectors when tuning cyber security for the IoT environment concerns. So, a security administrator is required to think the about possible vulnerabilities of the environment. Supervision and protocols must also be developed for suppliers, manufacturers, vendors, etc. The deployment of consumer understanding to make best use of “smart” strategy, using their own “smart” minds is required. There is a need for a framework or other types of guidance for assessing IoT cyber security to provide an informed approach to securing devices and the ecosystems in which they are set up.