Hardware security considerations and challenges in IoT architectures

Mohammad S. Khan, Sherali Zeadally, Nathan Eggers

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

The Internet of things is a transformational technology for society. IoT offers a wide variety of applications as computing devices shrink and become embedded in virtually everything. Smart devices can be used in home appliances, infrastructure, and even medical technologies. Smart homes, smart factories, and autonomous vehicles will eventually give rise to entirely automated cities. As IoT grows and advances, it becomes more critical that existing security concerns will be addressed. 134Embedded systems are small and are cheap by necessity. It is important that effective, inexpensive, and low-cost solutions for security are found for IoT devices. While it is not yet clear whether the best solutions will be provided by software or hardware, it is clear that regulation must be part of the solution. Effective policies and procedures for the Internet of things should mirror effective security solutions for existing cloud infrastructure. The primary differences will be that IoT solutions should be scalable to low-memory application, of low cost, standardized, or even open source and should be efficient in their use of processing power. As such, the security needs for IoT will require greater commitment and research. Research avenues which include blockchain and improved algorithms, encoded within both hardware and software systems, will make a more secure and resilient IoT infrastructure possible. Secure IoT networks will be crucial as distributed computing applications gain importance in society. Distributed security can be as transformational as the applications which it enables.

Original languageEnglish
Title of host publicationEmerging Real-World Applications of Internet of Things
Pages133-156
Number of pages24
ISBN (Electronic)9781000786705
DOIs
StatePublished - Jan 1 2022

Bibliographical note

Publisher Copyright:
© 2023 Anshul Verma, Pradeepika Verma, Yousef Farhaoui and Zhihan Lv.

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Hardware security considerations and challenges in IoT architectures'. Together they form a unique fingerprint.

Cite this