UAB - The University of Alabama at Birmingham

↑ Return to Research

IoT Security

iot_ecosystemInternet-of-Things is a result of a technical revolution, which reflects with future computing and communications including existing and evolving internet. Over the time Internet technologies have evolved, and become Internet of Things. With the advent of this paradigm the dream to convergence everything, and everyone under a single umbrella has come true. Machine-to-machine (M2M), Radio Frequency Identification (RFID), context-aware computing, wearables, ubiquitous computing, and web-of-things all are considered to be seamlessly integrated into a global information network, which has the  self configuring capabilities based on standard and inter-operable communication protocols .

 

iot_threat_modelPervasive connectivity, smart devices and demand for data means, that the Internet-of-Things is growing by leaps and bounds. Therefore, this smart paradigm is expected to be applied to for automation in nearly all fields – personal, professional, and business – , and  more data-centric businesses will be evolved. Internet-of-Things (IoT) devices have to make their data accessible to interested parties, which can be web services, smart phones, cloud resources, etc. Making these data available through the Internet is one thing; doing this in a controlled way, not exposing data to the whole world, is another thing. Therefore, security experts are warning that the more objects get linked via the Internet-of-Things, the greater the possibility is of digital mischief or mayhem.
iot_device_anatomy



In light of the above, it is important to examine and understand the critical security issues related to confidentiality, integrity, and availability of data in Internet of Things. In this project, we examine IoT architecture, inter devices interoperability​. In addition, we look into  IoT security complexity, threat models, security measures including security challenges and requirements.