An overview of the IoT security ecosystem
In current IoT solutions, there is not a single, end-to-end security solution. Each point in the ecosystem shown in Figure 7.1 provides some security solutions that are not connected to other solutions deployed in other points within the ecosystem. This distributed and uncoupled approach is not capable of providing a secure end-to-end system but instead allows points of compromise. In such an insecure system, the critical aspect is the integrity of the data that is being sent and received. Conventional IT data security products such as firewalls and Intrusion Detection Systems/Intrusion Prevention Systems (IDSs/IPSs) do not typically transfer over to the IoT space. While these products may play a role in IoT security, the use of newer protocols and varied types of IoT devices requires the development of new solutions. The solutions being deployed will need to account for varied device types and connectivity models.