Domain-specific security considerations
The data sensitivity and hardware or software capabilities of both the backend system and field devices may vary from one domain to another (connector consumer devices such as smart fridges typically run on constrained hardware, whereas the autonomous car would typically have powerful processing capabilities). The importance attached to the three pillars of security (CIA) varies from one domain to another or one use case to another – the video feed from a camera installed in a public place (traffic intersection) might not be confidential but the data feed from a person’s living room would be confidential. Although the fundamental principles of providing IoT security are similar across domains, there are certain implementation nuances that you should be aware of, which are described in this section:
- Difference in data sensitivity across different domains: The volume and level of sensitivity of the transmitted data varies...