Authentication and authorisation for IoT application

To ensure confidentiality, integrity and availability in IoT systems, a number of security aspects need to be considered, in order to achieve security and privacy by design. In this second blog of a series we dig deeper in authentication and authorisation for IoT application.

Having a secure platform and environment for IoT devices to operate is important, in order to ensure safety of users and prevent unwanted consequences that might occur as a result of a security loophole. In this sense, organisations delivering and using IoT systems must be diligent in their defence of device data and security aspects must be considered and implemented in their early design phase, not as an afterthought.

Sirris has built up extensive experience and knowhow in IoT security and will discuss all issues in detail in a series of white papers. Our second white paper focuses on authentication and authorisation for IoT application. In this paper, we look at different authentication and authorisation methods, the existing standard authentication and authorisation protocols and the challenges. You can download our second white paper by registering here.

Authentication and authorisation, processes of identifying an individual and giving individual access to system objects based on their identity, play an important role in providing protection to IoT system objects against attacks. These processes ensure that devices connected to systems, as well as the associated application users, are genuine and prevent malicious devices and users from tampering with the system. Given their strategic importance, it is crucial to properly select the right methods suitable to the needs, use case and context of the application.

Would you like to know more about this topic? Sirris has built up extensive experience and knowhow in IoT security. Contact us!