Chapter 10 IoT security best practices
Document Type
Book Chapter
Source of Publication
Accelerating Digital Transformation with the Cloud and the Internet of Things (IoT)
Publication Date
1-1-2025
Abstract
This chapter provides comprehensive IoT security strategies to safeguard interconnected devices and systems in the cloud-to-things continuum. Advanced authentication, encryption techniques, and the significance of data-centric analytics for proactive security measures are revealed. The chapter emphasizes the integration of machine learning and security information and event management (SIEM) systems as innovative approaches for risk assessment and incident response. Physical security measures along with the emerging concept of security as a service (SECaaS) are discussed in support of a robust and adaptable security framework that addresses the evolving IoT threat landscape and vulnerabilities.
DOI Link
ISBN
9780443222177
Publisher
Elsevier
First Page
277
Last Page
298
Disciplines
Computer Sciences
Keywords
IoT security, authentication, encryption, machine learning, SECaaS
Recommended Citation
Atif, Yacine and Mathew, Sujith Samuel, "Chapter 10 IoT security best practices" (2025). All Works. 7147.
https://zuscholars.zu.ac.ae/works/7147
Indexed in Scopus
no
Open Access
no