Reader small image

You're reading from  Architectural Patterns and Techniques for Developing IoT Solutions

Product typeBook
Published inSep 2023
PublisherPackt
ISBN-139781803245492
Edition1st Edition
Right arrow
Author (1)
Jasbir Singh Dhaliwal
Jasbir Singh Dhaliwal
author image
Jasbir Singh Dhaliwal

Jasbir Singh Dhaliwal has over 26 years of software development and management experience, including 10 years in delivering complex IoT projects. Currently employed with IBM as a Principal Architect (IoT and cloud) and considered a thought leader with over 31 IoT patents, he has a deep understanding of IoT concepts/architectures and has delivered IoT projects in diverse domains such as consumer goods, smart buildings, healthcare, precision agriculture, automobile, and manufacturing. His extensive experience in both the public cloud and embedded domains gives him a unique edge in conceiving innovative end-to-end IoT solutions. He holds a bachelor's degree in computer science and engineering from Punjab Engineering College, India.
Read more about Jasbir Singh Dhaliwal

Right arrow

Mitigating IoT security vulnerabilities

Providing a robust security posture is a complex endeavor and requires the active involvement of different parties throughout the solution life cycle. Following the guidelines (or preferably a combination thereof) mentioned in this section would help to provide a credible defense against potential threats/vulnerabilities:

  • Using AI/ML techniques: These are effective deterrents against increasingly sophisticated security attacks. AI/ML techniques can monitor network traffic as well as device data to flag suspicious behavior. Manual monitoring is no longer an option due to the ever-increasing list of attack vectors.

These techniques rely on using context-aware access controls at all layers of the IoT stack to allow only the expected actions and behaviors. The system behavior is monitored for a reasonable period to establish a baseline of expected behaviors and anomaly thresholds and the accumulated baseline data is used to flag malicious...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Architectural Patterns and Techniques for Developing IoT Solutions
Published in: Sep 2023Publisher: PacktISBN-13: 9781803245492

Author (1)

author image
Jasbir Singh Dhaliwal

Jasbir Singh Dhaliwal has over 26 years of software development and management experience, including 10 years in delivering complex IoT projects. Currently employed with IBM as a Principal Architect (IoT and cloud) and considered a thought leader with over 31 IoT patents, he has a deep understanding of IoT concepts/architectures and has delivered IoT projects in diverse domains such as consumer goods, smart buildings, healthcare, precision agriculture, automobile, and manufacturing. His extensive experience in both the public cloud and embedded domains gives him a unique edge in conceiving innovative end-to-end IoT solutions. He holds a bachelor's degree in computer science and engineering from Punjab Engineering College, India.
Read more about Jasbir Singh Dhaliwal