The Challenges with Internet of Things Security for Business
dc.contributor.author | Kuzminykh, I | |
dc.contributor.author | Ghita, B | |
dc.contributor.author | Such, JM | |
dc.contributor.editor | Koucheryavy Y | |
dc.contributor.editor | Balandin SI | |
dc.contributor.editor | Andreev S | |
dc.date.accessioned | 2023-03-17T14:23:12Z | |
dc.date.available | 2023-03-17T14:23:12Z | |
dc.date.issued | 2022-03-16 | |
dc.identifier.isbn | 9783030977764 | |
dc.identifier.uri | https://pearl.plymouth.ac.uk/handle/10026.1/20583 | |
dc.description.abstract |
Many companies consider IoT as a core element for increasing competitiveness. Despite the growing number of cyberattacks on IoT devices and the importance of IoT security, no study has yet primarily focused on the relationship between the potential impact of IoT security measures and the security challenges when implementing them. This paper presents a review of the current state of the art in IoT security for companies that produce IoT products and started transitioning towards the digitalization of their products and processes. The analysis of challenges in IoT security was conducted while mapping the relevant solutions for strengthening security to the already existing challenges. Based on the analysis, we conclude that almost all companies have an understanding of basic security measures such as encryption, but do not understand threat surface and not aware of advanced methods of protecting data and devices. The analysis shows that most companies do not have internal experts in IoT security and prefer to outsource operations to security providers. | |
dc.format.extent | 46-58 | |
dc.publisher | Springer International Publishing | |
dc.relation.ispartof | Lecture Notes in Computer Science | |
dc.subject | 46 Information and Computing Sciences | |
dc.subject | 4604 Cybersecurity and Privacy | |
dc.title | The Challenges with Internet of Things Security for Business | |
dc.type | chapter | |
plymouth.volume | 13158 LNCS | |
plymouth.publisher-url | https://link.springer.com/chapter/10.1007/978-3-030-97777-1_5#chapter-info | |
plymouth.publication-status | Published | |
plymouth.series | Lecture Notes in Computer Science | |
dc.identifier.doi | 10.1007/978-3-030-97777-1_5 | |
plymouth.organisational-group | |Plymouth | |
plymouth.organisational-group | |Plymouth|Faculty of Science and Engineering | |
plymouth.organisational-group | |Plymouth|Faculty of Science and Engineering|School of Engineering, Computing and Mathematics | |
plymouth.organisational-group | |Plymouth|REF 2021 Researchers by UoA | |
plymouth.organisational-group | |Plymouth|Users by role | |
plymouth.organisational-group | |Plymouth|Users by role|Academics | |
plymouth.organisational-group | |Plymouth|REF 2021 Researchers by UoA|UoA11 Computer Science and Informatics | |
dc.date.updated | 2023-03-17T14:23:03Z | |
dc.rights.embargodate | 2024-3-16 | |
rioxxterms.versionofrecord | 10.1007/978-3-030-97777-1_5 |