Affiliation:
1. University of Petroleum and Energy Studies, India
Abstract
The ever-expanding world of IoT and IIoT devices necessitates a robust and adaptable security framework to safeguard these interconnected systems. This chapter outlines the core principles for building such a framework, emphasizing proactive and continuous protection strategies for vulnerability analysis, malware detection, and anomaly detection. The framework foundation lies in conducting thorough risk assessments. By identifying potential vulnerabilities in devices, networks, and protocols, we can prioritize mitigation efforts and the use of secure protocols like TLS (transport layer security) and DTLS (datagram transport layer security) for encrypting data transmission, protecting sensitive information from unauthorized access. Anomaly detection systems identify deviations from normal behavior, while intrusion prevention systems (IPS) actively block malicious network activity. However, security cannot be an afterthought. This chapter emphasizes the importance of integrating security considerations throughout the development lifecycle of IoT/IIoT devices.
Reference8 articles.
1. Erwin, B. (2021). The Groundbreaking 2015 Jeep Hack Changed Automotive Cybersecurity. Fractional CISO - Virtual CISO. https://fractionalciso.com/the-groundbreaking-2015-jeep-hack-changed-automotive-cybersecurity/
2. DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments
3. Gillis, A. (n.d.). What is IIoT (Industrial Internet of Things)? Definition from TechTarget.com. IoT Agenda. https://www.techtarget.com/iotagenda/definition/Industrial-Internet-of-Things-IIoT
4. RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT
5. IBM. (2023). Cost of a Data Breach 2023. IBM. https://www.ibm.com/reports/data-breach