From the course: Securing the IoT: Secure Architectures

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Architecting IoT security domains

Architecting IoT security domains

From the course: Securing the IoT: Secure Architectures

Start my 1-month free trial

Architecting IoT security domains

- [Instructor] There are four areas in and end-to-end IoT system that which we should consider security. Devices, the proximity or narrowband network, gateway and access network, and the application tier. The devices and application tiers can generally be considered as domains within their own security policies, and clearly defined into domain associations. Both communication tiers have a common purpose of inter-domain transfer of data and commands rather than data collection or application transformations. We can consider these as pseudo domains with transfer protection attributes. Let's look at these domains and their interactions from an architectural perspective. We'll start with the application tier, as it's likely to be the closest to the business outcomes. In doing this, adopting the three tier model of business technology security attributes, turns out to be a good approach. The business outcomes exists at the contextual layer. The application tier, be that a complex business…

Contents