burger menu
IoT Security Guidelines

IoT Security Guidelines

    Add to bookmarks
SUMMARY

The report recommends key secure design principles for IoT Service Providers, Device Manufacturers, Developers, and Network Operators.

Analysts have predicted that hundreds of thousands of new IoT services will connect billions of new IoT devices over the next decade. Security issues are a significant inhibitor to the deployment of many new digital services. This report establishes a common understanding of the Internet of Things security issues.

For the IoT to evolve effectively and safely, digital companies must solve inherent security challenges to availability, identity, privacy, and security.  Availability refers to constant connectivity. According to GSMA, the availability of IoT-supported networks will rise. An addition 2.3 billion mobile broadband networks are forecast from 2016 to 2020. Within these mobile networks, IoT services and networks must authenticate the identity of endpoints, services, and the customer. With that said, IoT products need to reduce risks to individual end-users’ privacy and data. IoT service providers and innovators should ensure security systems can be confirmed, coursed, and checked. To secure identity, technologies, such as the Embedded SIM, are manufactured to withstand attacks: glitching, physical tampering, and identity theft. Moreover, network technology can be secured via SIM and access protocols such as GBA, which distributes access keys to all endpoints in a system during every boot-up, ensuring old keys are not reused. However, subtle cracks in communication architecture can lead to a compromised ecosystem. A single flawed endpoint can compromise a whole system.

As the human and digital experiences intertwine, it should be secure as digital consequences affect the physical world. The report recommends IoT and digital organizations consider several key design data protection principles, such as lawful data processing, intent and use limitations, and user control and rights.

 

OUTLINE

Introduction

The Challenges

The Mobile Solution

The Iot Model

Risk Assessments

Privacy Considerations

How to Use this Guide

Examples

Annexes

DETAILS

Overview

Researchfinder Rating
5 out of 5 stars
Title
IoT Security Guidelines
Region
Global
Published
March 15, 2019
Publisher
GSMA
Price
FREE
Language
ENGLISH

Content

Number of Pages
54
Number of Tables
14
Number of Exhibits
10
Topics
iot, mobile, networks, security, software
Tags
autonomous vehicles, GSMA, iot, mobile, privacy, risk management, security, smart mobility, smart wearable
Companies mentioned
GSMA
Methodology
Network specialists explore challenges to privacy and security in new Internet of Things. Recommendations, suggestions and protection design principles are illustrated through various industry case studies.
EVALUATION

This report contains practical key design principles to ensure digital companies design secure networks, products, and platforms.

The accompanying checklist is an excellent guide for IoT designers, network controllers, and device manufacturers. Figures help readers comprehend complex network decision-making. Industry terms and acronyms are defined and described.

Positives

  • Figures simplify technological concepts and network connections
  • Practical data protection principles
  • Real-world case studies

Similiar Reports

Smart Mobility

FREE

The 2019 State of IOT Report

FREE

The 5G Ecosystem

FREE