IoT-based Application of Information Security Triad

Dublin Core

Title

IoT-based Application of Information Security Triad

Subject

IoT Application
Security of IoT
Information Security
Security Triad

Description

Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, and privacy are not addressed well. Most IoT devices having constraints in computational and operational capabilities are a threat to security and privacy, also prone to cyber-attacks. This study presents a CIA triad-based information security implementation for the four-layer architecture of the IoT devices. An overview of layer-wise threats to the IoT devices and finally suggest CIA triad-based security techniques for securing the IoT devices.

Creator

Al Reshan, Mana Saleh

Source

International Journal of Interactive Mobile Technologies (iJIM); Vol. 15 No. 24 (2021); pp. 61-76
1865-7923

Publisher

International Association of Online Engineering (IAOE), Vienna, Austria

Date

2021-12-21

Rights

Copyright (c) 2021 Mana Saleh Al Reshan
https://creativecommons.org/licenses/by/4.0

Relation

Format

application/pdf

Language

eng

Type

info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article

Identifier

Citation

Al Reshan, Mana Saleh, IoT-based Application of Information Security Triad, International Association of Online Engineering (IAOE), Vienna, Austria, 2021, accessed November 6, 2024, https://igi.indrastra.com/items/show/2164

Social Bookmarking