Security review on the Internet of Things

Jack Whitter-Jones*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper looks at Internet of Things devices from a security perspective to help provide an understanding on the impact Plug and Play Internet of Things devices have on organizations and Home networks. Such devices which are common within IoT are Internet connected devices such as mobile phones, routers or fridges. The papers key areas are to focus on the attack surface such as Malware within the Internet of Things domain, poor web interfaces which are exposed to the Internet, improper network connectivity and default credentials being used after purchase. In addition to discussing the attack surface, the paper looks at security best practices and outlines how to properly administer and manage IoT devices within controlled networks such as private organizations, government and home networks. This focuses on reasons for allowing such devices as well as guidance for best practices through the developing, manufacturing and consumer life cycle.

Original languageEnglish
Title of host publication2018 3rd International Conference on Fog and Mobile Edge Computing, FMEC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages163-168
Number of pages6
ISBN (Electronic)9781538658963
DOIs
Publication statusPublished - 23 May 2018
Externally publishedYes
Event3rd International Conference on Fog and Mobile Edge Computing, FMEC 2018 - Barcelona, Spain
Duration: 23 Apr 201826 Apr 2018

Conference

Conference3rd International Conference on Fog and Mobile Edge Computing, FMEC 2018
Country/TerritorySpain
CityBarcelona
Period23/04/1826/04/18

Keywords

  • Internet of Things
  • IoT Attack Surface
  • IoT Malware
  • Security
  • Security Best Practices

Fingerprint

Dive into the research topics of 'Security review on the Internet of Things'. Together they form a unique fingerprint.

Cite this