Security in the IoT Context
Previous chapters provided examples of how IoT can be used to provide solutions to achieve various business targets within diverse problem domains. As a solution scales and graduates from the proof of concept stage to the production deployment stage, one crucial barrier that needs to be crossed is making these solutions secure from the acts of malicious actors. Security generally has the highest priority among non-functional requirements (NFRs) in any solution; however, in the case of IoT solutions, this requirement becomes non-negotiable due to the potential risk of material and/or human loss. It is no surprise, then, that security is cited as one of the topmost factors that can limit the adoption of IoT solutions at a large scale.
Non-existent and patchy regulatory security norms are among the reasons why consumers often make do with solutions released with security vulnerabilities that are exploited by malicious actors on the first day of solution...