IoT Security
What is IoT Security?
IoT SecurityThe discipline of protecting Internet-of-Things devices, gateways, networks, and cloud services from compromise, given their scale, constrained resources, and long lifetimes.
IoT security covers the design, deployment, and operation of safeguards for Internet-of-Things ecosystems: consumer gadgets, smart-home devices, connected vehicles, medical implants, smart-city sensors, and industrial IIoT assets. It must contend with constrained CPUs and memory, intermittent connectivity, weak default credentials, infrequent patches, and supply chains spanning many vendors. Core controls include unique device identity (often via secure elements or TPM-like chips), strong device authentication, signed firmware with secure boot, encrypted-by-default communications (TLS, DTLS, MQTT over TLS), network segmentation, and robust update mechanisms. Regulations such as the EU Cyber Resilience Act, the UK PSTI Act, and standards like ETSI EN 303 645 and NIST IR 8259 now codify minimum IoT security requirements.
● Examples
- 01
A smart camera that requires unique per-device passwords, signed firmware, and TLS-encrypted cloud telemetry.
- 02
An IIoT gateway that segments machine-data uplinks from the production network through a one-way diode.
● Frequently asked questions
What is IoT Security?
The discipline of protecting Internet-of-Things devices, gateways, networks, and cloud services from compromise, given their scale, constrained resources, and long lifetimes. It belongs to the OT / ICS / IoT category of cybersecurity.
What does IoT Security mean?
The discipline of protecting Internet-of-Things devices, gateways, networks, and cloud services from compromise, given their scale, constrained resources, and long lifetimes.
How does IoT Security work?
IoT security covers the design, deployment, and operation of safeguards for Internet-of-Things ecosystems: consumer gadgets, smart-home devices, connected vehicles, medical implants, smart-city sensors, and industrial IIoT assets. It must contend with constrained CPUs and memory, intermittent connectivity, weak default credentials, infrequent patches, and supply chains spanning many vendors. Core controls include unique device identity (often via secure elements or TPM-like chips), strong device authentication, signed firmware with secure boot, encrypted-by-default communications (TLS, DTLS, MQTT over TLS), network segmentation, and robust update mechanisms. Regulations such as the EU Cyber Resilience Act, the UK PSTI Act, and standards like ETSI EN 303 645 and NIST IR 8259 now codify minimum IoT security requirements.
How do you defend against IoT Security?
Defences for IoT Security typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for IoT Security?
Common alternative names include: Internet of Things security, IoT cybersecurity.
● Related terms
- ot-iot№ 551
IoT Botnet
A network of compromised Internet-of-Things devices remotely controlled to launch attacks such as DDoS, credential stuffing, click fraud, or cryptomining.
- ot-iot№ 422
Firmware Over-the-Air (OTA)
A mechanism for delivering and installing firmware updates to remote devices through wireless or networked channels, without physical access.
- ot-iot№ 683
Mirai Botnet
An IoT malware family first seen in 2016 that recruits routers, cameras, and DVRs through default credentials and was used in the Dyn DNS DDoS that broke much of the U.S. internet.
- ot-iot№ 267
Cyber-Physical System (CPS)
An engineered system that integrates sensors, actuators, and computation to monitor and control physical processes, where digital and physical layers are tightly coupled.
- ot-iot№ 762
Operational Technology (OT)
Hardware and software that monitor and control physical processes, devices, and infrastructure such as factories, power plants, and utilities.
- ot-iot№ 1267
Zigbee Security
The set of cryptographic and network controls that protect Zigbee mesh networks of low-power IoT devices, based on IEEE 802.15.4 and AES-CCM* keys.
● See also
- № 115Bluetooth LE Security
- № 634LoRaWAN Security
- № 225COSE
- № 111BlueBorne
- № 102BleedingTooth
- № 121BrakTooth