TACS Consulting Services, Management Consultans to Networking IndustryTACS Consulting Services, Management Consultans to Networking Industry

 

 

 

     

S-IoT

 

 
Home ] Up ] Competences ] Partners ] Services ] About ] Views ] Site Map ] Search ]

 

 
IoFT ] [ S-IoT ] IoT Cases ] LoRaWAN ]

 



 

Up

Secure IoT: Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities

   
   

TACS is a leading top consultancy in the field of IoT.

Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities

The widespread adoption of the Internet of Things (IoT) technologies has drastically increased the breadth and depth of attack surfaces in networked systems, providing new mechanisms for the intrusion. In the context of smart-world critical infrastructures and cyber-physical systems, the rapid adoption of the IoT systems and infrastructures without thorough consideration for the risks and vulnerabilities has the potential for catastrophic damage to the privacy, safety, and security of individuals and corporations. While the IoT systems have the potential to increase productivity, accountability, traceability, and efficiency, their potential weaknesses are also more abundant. Here a critical consideration of the security of the IoT systems as applied to smart-world critical infrastructures is provided. Particularly,  a detailed assessment of vulnerabilities in IoT-based critical infrastructures is carried out from the perspectives of applications, networking, operating systems, software, firmware, and hardware. In addition, the three key critical infrastructure IoT-based cyber-physical systems, namely the smart transportation, smart manufacturing, and smart grid are higlighted. Moreover, a broad collection of attack examples upon each of the key applications is provided. Furthermore, a case study is introduced, in which the impacts of potential attacks on critical IoT-based systems are assessed, using the smart transportation system as an example. Finally, a set of best practices is provided and  the necessary steps to enact countermeasures for any generic IoT-based critical infrastructure system are addressed. Read more at:

Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities (pdf)

 

IoT vulnerability structure.

IoT vulnerability structure.

 

 

 

TACS 

  • Delivers the insight and vision on technology for strategic decisions on IoT.
  • Assesses technologies and standards and develops architectures for IoT.
  • Provides the energy and experience of world-wide leading innovators and experts in IoT.
 

 

   
   
   

   
 
   
 
 

 


 

   
 

TACS
 


 
 

Home ] Up ] Competences ] Partners ] Services ] About ] Views ] Site Map ] Search ]

IoFT ] [ S-IoT ] IoT Cases ] LoRaWAN ]

Copyright 2021 TACS
Last modified: January 19, 2022

 

The Best Networks Start with the Best Consultants - TACS