Security Challenges Represented by the IoT Research Paper

Total Length: 652 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2

The Future of IoT with PKI & End-Point Device ManagementThanks to the Internet of Things (IoT) people and places and devices are now more connected than ever before. People can communicate with one another from anywhere in the world; they can control their homes and property with their smart phones no matter where they are at present. These devices can be used in residential and commercial and industrial settings, and from homes to supply chain management they are finding utility. However, as these tools become more popular, security issues also arise. Public Key Infrastructure (PKI) and end-point device management have become important tools for addressing the security concerns that accompany IoT.PKI in IoTPKI is not a new concept, but its application in the IoT is revolutionary (Pieroni et al., 2020). PKI operates on asymmetric cryptography, where two keys, one public and the other private, are used for permissions. The public key is available to everyone, while the private key remains confidential to the device or user.In the context of IoT, one can easily see how this is applicable in terms of providing security. For example, one may have something as simple as a smart thermostat or a connected car that one can only reach remotely.

Stuck Writing Your "Security Challenges Represented by the IoT" Research Paper?

These devices need to communicate with other devices or central servers securely…

[…… parts of this paper are missing, click here to view the entire document ]

…to once they are connected. This dual-prong approach to security is helpful, for example, if there is a situation where a smart meter is compromised after connecting to the network. PKI would have ensured its authenticity prior to connection, but post-connection malicious influences were spotted by end-point management tools. Thanks to them corrective action could be taken.ConclusionThe future of IoT really depends on strong security frameworks. PKI and end-point device management offer a robust take on how to solve the security challenges that IoT presents to users all over the world. The more that the two-prong approach of PKI and end-point device management is used, the more secure networks, devices,….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security Challenges Represented By The IoT" (2023, September 14) Retrieved May 18, 2024, from
https://www.aceyourpaper.com/essays/security-challenges-represented-iot-2179873

Latest MLA Format (8th edition)

Copy Reference
"Security Challenges Represented By The IoT" 14 September 2023. Web.18 May. 2024. <
https://www.aceyourpaper.com/essays/security-challenges-represented-iot-2179873>

Latest Chicago Format (16th edition)

Copy Reference
"Security Challenges Represented By The IoT", 14 September 2023, Accessed.18 May. 2024,
https://www.aceyourpaper.com/essays/security-challenges-represented-iot-2179873