Device Risks to Network Operators from IoT (2017)

By Brian A. Scriber, CableLabs

The promise of the Internet of Things (IoT) is to develop systems, sensors, and rules to help automate our environments in a way that brings connectivity between people, security and protection to individuals and families, and allows us to bridge gaps in geography. Security in this realm has been widely discussed, often bemoaned and still in need of improvement.

Grouping like concerns around IoT Security results in seven groups of closely related concepts: Identity, Onboarding, Confidentiality, Integrity, Availability, Lifecycle Management, and Future Security. Each of these can be further broken down into subcategories, and each comes with its own particular threats as well as techniques to help secure it.

By clicking the "Download Paper" button, you are agreeing to our terms and conditions.

Similar Papers

Assuring Data Delivery from Critical IoT Devices: A Method to Create New Services and Mitigate Liability
By Michael Kloberdans & Shlomo Ovadia, Charter Communications
2018
Internet of Things Dynamics: Opportunities and Challenges for Broadband Network Operators
By Tim Johnson, Alpha Technologies; Arun Ravisankar, Comcast; J. Clarke Stevens, Shaw Communications; Chris Bastian, SCTE-ISBE
2018
Adapting Proven Technology to Counter IoT Threats
By Petr Peterka, Verimatrix
2017
Can EMTC IoT Be Supported over the HFC Network
By Shengbo Ge, Cable HFC/CRDC CHG/ Cisco Systems (China) Research and Development Co., Ltd
2017
Navigating IoT Technologies, Standards and Frameworks for Managed IoT Service
By Gary Gutknecht, Technicolor
2018
IoT for Peace of Mind
By Arun Ravisankar, Comcast Corporation
2017
Cablelabs 1991 Advanced Network Development Work
By Stephen D. Dukes, Cable Television Laboratories, Inc.
1991
Solving All Our Problems…Sort of…Blockchain Integrity, Security, and Reliability for Cable Use Cases
By Steve Goeringer & Dr. Jason Rupe, CableLabs
2018
Preventing Unwelcome Guests in Your Home: Securing IoT Devices Within the Home Network
By Dave Belt, Irdeto
2018
Implementing a Behavioral Analysis Approach to Thwart IoT Attacks
By David Yates, Guavus, A Thales Company
2017
More Results >>