Content of Figures
1 Executive Summary
Internet of Things (IoT) devices are proliferating as more consumers, companies, countries, and organizations embrace Digital Transformation. IoT is a ...
Manufacturing, as an example, has been operating shop floor equipment for decades with sensors that control processes, but these sensors have not been ...Login Free 30-day Select Access Get full Access
- IoT is rapidly expanding into all corners of industrial, agricultural, and consumer life
- IoT devices are communicating with a myriad of back-end a ...
3 Communication within IoT
The lack of technical capabilities in many IoT devices hampers the efforts of cybersecurity professionals to build in identity management and cybersec ...Login Free 30-day Select Access Get full Access
3.1 IoT communication considerations
Many different types of transmitters and communication options exist for IoT devices. Though IoT as a concept is relatively young, we see device manu ...Login Free 30-day Select Access Get full Access
3.2 IoT communication protocols
IoT devices can utilize several different protocols:
- TCP/IP – Transmission Control Protocol over Internet Protocol is the primary protocol of th ...
4 Technical capabilities and limitations
In addition to communication prerequisites, IoT devices must possess sufficient processing power, memory, and storage to protect themselves on network ...Login Free 30-day Select Access Get full Access
4.1 Processing and storage
Most first generation IoT devices were built expressly for their intended purpose, with little or no additional capacity for performing security and i ...
As in desktop and server computing, stronger and faster CPUs can enable more robust identity schemes.
|IoT Device Model||Technical Notes ...|
4.2 Authentication options
Some basic IoT devices have no identity functions whatsoever. Others can pass a pre-determined username and password which is not (easily) configurab ...Login Free 30-day Select Access Get full Access
4.3 Physical Unclonable Functions (PUFs)
PUFs can be derived from unique characteristics of the underlying silicon or integrated circuits produced during the manufacturing process. Some phys ...Login Free 30-day Select Access Get full Access
4.4 Public Key Cryptography for IoT
x.509 certificates have been used as identity credentials for decades. They are common today in USB keys, Smart Cards, and for client-server identifi ...
For optimum use in IoT, device manufacturers should issue keys and certificates for each device at the time of manufacture. Issuers should use FIPS 1 ...Login Free 30-day Select Access Get full Access
4.5 Secure Element and Trusted Execution Environment
Global Platform is an international standards organization that defines specifications for the Trusted Execution Environment (TEE), or the secure virt ...Login Free 30-day Select Access Get full Access
4.6 Additional security tools
Desktop computing has seen the advent of numerous security tools over the past couple of decades. Firewalls, anti-malware, VPNs, vulnerability analyt ...Login Free 30-day Select Access Get full Access
5 Identity and Access Management solutions for IoT
Forward thinking Consumer Identity and Access Management (CIAM) vendors are providing facilities to associate user identities with consumer device ide ...Login Free 30-day Select Access Get full Access
5.1 OAuth 2.0 Device Flow
The majority of CIAM solutions for IoT Identity utilize the IETF’s OAuth 2.0 Device Flow for Browserless and Input Constrained Devices profile. Thi ...
Depending on the CIAM platform, additional technical capabilities of the registered devices, and agreements with IoT device manufacturers, consumers c ...Login Free 30-day Select Access Get full Access
5.2 API Gateways
Given that many current generation IoT products on the market today lack the onboard technical capabilities for adequate device identity representatio ...Login Free 30-day Select Access Get full Access
6 Challenges with integrating identity and IoT
The Internet of Things must have digital identity built-in to improve user experiences, privacy, and security. This begins with device identity, foll ...Login Free 30-day Select Access Get full Access
Users of all types need to use, monitor, and manage IoT devices. IAM vendors, especially CIAM companies, are working to incorporate IoT device identi ...Login Free 30-day Select Access Get full Access