Industrial manufacturing
Industrial Internet of Things | Industrial materials | Equipment Maintenance and Repair | Industrial programming |
home  MfgRobots >> Industrial manufacturing >  >> Industrial Internet of Things >> Internet of Things Technology

IoT Security – A Practical Guide from Perry Lea

IoT Security – A Practical Guide from Perry Lea Editor’s Note: Securing the Internet of Things (IoT) is critical not only for the integrity of data streams and software within each IoT application, but also for the integrity of the enterprise resources tied into those applications. IoT security is a complex problem, requiring a systematic approach for understanding possible threats and corresponding mitigation methods.

In Chapter 12 of Internet of Things for Architects, Perry Lea delves into the core principles of IoT security. This chapter is presented as part of a multi‑part series, including:

Adapted from Internet of Things for Architects, by Perry Lea.


Chapter 12. IoT Security

By Perry Lea

Cyber Security Vernacular

The opening chapter of the book outlined the sheer scale of the Internet of Things—billions of devices connected worldwide and a double‑digit growth rate that turns the analog world into the largest attack surface on the planet. Exploits, malware, and rogue actors already disrupt businesses, networks, and lives on a global scale. As architects, we must understand the IoT stack and embed security at every layer—from the sensor to the cloud.

Historically, many IoT deployments treat security as an afterthought. Constraints on memory, processing power, and power consumption often make it difficult to apply the same enterprise‑grade protections found in modern PCs and web platforms. This chapter addresses those gaps by reviewing the most damaging IoT‑specific attacks and outlining practical countermeasures across the stack: physical devices, communication protocols, and network infrastructure.

We also explore advanced concepts such as software‑defined perimeters and blockchain, and conclude with a discussion of the United States Cybersecurity Improvement Act of 2017 and its implications for IoT manufacturers.

Attack and Threat Terminology

Below is a concise glossary of the most common attack vectors that target IoT systems:

Understanding these terms is the first step toward building resilient IoT systems that can withstand the evolving threat landscape.

Internet of Things Technology

  1. Securing the Industrial IoT: A Practical Roadmap
  2. Four Critical IoT Security Threats in 2015 — What Developers Need to Know
  3. Two Essential Strategies for IoT Security
  4. 5G’s Backbone at Risk: Insecure IoT Devices Undermine Network Security
  5. IoT Security: Cryptographic Foundations for Robust Device Protection
  6. IoT Security – Who Holds the Responsibility?
  7. The Rise of IoT: Why Security Must Be Built In from Day One
  8. IoT Security: Overcoming Deployment Barriers
  9. Protecting IoT Devices with Deception Technology
  10. Protecting Your Data: The Ultimate Guide to IoT Privacy & Security