Securing the Internet of Things: Best Practices for Deploying IoT Devices

  • Bryson R. PayneEmail author
  • Tamirat T. Abegaz


The Internet of Things (IoT) has brought a wealth of new technologies both in homes and businesses onto IP networks not natively designed to securely support such myriad devices. Networks once hosting only computers and printers now routinely contain payment systems, Wi-Fi and mobile/wearable devices, VoIP phones, vending machines, sensor and alarm systems, servers, security cameras, thermostats, door locks and other building controls, just to name a few. This chapter analyzes current best practices for securing computer networks with special attention to IoT challenges, discusses selected major IoT security incidents, details selected IoT cyber attacks as proofs of concept, and presents a framework for securely deploying IoT devices in the enterprise and at home.



This work was supported in part by National Security Agency and National Science Foundation GenCyber grant project #H98230-16-1-0262.

The authors also wish to thank colleagues and security experts Rob Cherveny and Dr. Markus Hitz for thoughtful input and feedback throughout this chapter.


  1. 1.
    ASD Australian Signals Directorate. (2014). Strategies to mitigate targeted cyber intrusions. Accessed 5 December 2016.
  2. 2.
    Charney, S. (2010). Collective defense: Applying public health models to the Internet. White paper. Redmond, Wash: Microsoft Corporation. Accessed 30 December 2016.
  3. 3.
    Coldewey, D. (2016). ‘Smart’ locks yield to simple hacker tricks. TechCrunch. Accessed 8 January 2017.
  4. 4.
    Cyber Risk Report. (2016). HPE security research. Accessed 5 January 2017.
  5. 5.
    Franceschi-Bicchierai, L. (2016a). Hacker claims to push malicious firmware update to 3.2 million home routers. Accessed 3 January 2017.
  6. 6.
    Franceschi-Bicchierai, L. (2016b). Hackers make the first-ever ransomware for smart thermostats. Accessed 2 January 2017.
  7. 7.
    Gartner. (2015). Gartner says 6.4 billion connected “things” will be in use in 2016, Up 30 Percent from 2015. Accessed 3 January 2017.
  8. 8.
    Greene, C., Stavins, J. (2016). Did the target data breach change consumer assessments of payment card security? (Research Data Reports No. 16-1). Federal Reserve Bank of Boston.Google Scholar
  9. 9.
    ISO. (2015). IT-security techniques-storage security (ISO/IEC Standard No. 27040). Retrieved from
  10. 10.
    ISTR: Internet Security Threat Report. (2016). Accessed 5 January 2017.
  11. 11.
    Krebs, B. (2016a). Hacked cameras, DVRs powered today’s massive internet outage. outage/. Accessed 20 December 2016.
  12. 12.
    Krebs, B. (2016b). Who makes the IoT things under attack. Accessed 3 January 2017.
  13. 13.
    Level 3 Research Labs. (2016). How the grinch stole IoT. Accessed 2 January 2017.
  14. 14.
    MalwareTech. (2016). Mapping mirai: A botnet case study. Accessed 31 December 2016.
  15. 15.
    Morgan, S. (2016). Cyber crime costs projected to reach $2 trillion by 2019. Accessed January 09 2017.
  16. 16.
    Nichols, O., Yang, L., & Yuan, X. (2016, October 4). Teaching security of internet of things in using raspberry Pi. In KSU conference on cybersecurity education, research and practice.Google Scholar
  17. 17.
    O’Harrow, Jr. R. (2012, June 3). Cyber search engine Shodan exposes industrial control systems to new risks. The Washington Post, 6.Google Scholar
  18. 18.
    OWASP (2016). Manufacturer IoT security guidance. Open web application security project. Accessed 5 January 2017.
  19. 19.
    Pauli, D. (2016). IoT worm can hack Philips Hue lightbulbs, spread across cities. The Register. spread_across_cities/. Accessed 5 January 2017.
  20. 20.
    Schneier, B. (2016). We need to save the internet from the internet of things. Motherboard. Accessed 7 January 2017.
  21. 21.
    Shields, K. (2015). Cybersecurity: Recognizing the risk and protecting against attacks. North Carolina Banking Institute, 19, 345.Google Scholar
  22. 22.
    Simon, K. (2016, November 14). Vulnerability analysis using google and shodan. In International conference on cryptology and network security (pp. 725–730). Springer International Publishing.Google Scholar
  23. 23.
    Slay, J., & Miller, M. (2007, March 19). Lessons learned from the maroochy water breach. In Conference on critical infrastructure protection (pp. 73–82). New York: Springer.Google Scholar
  24. 24.
    Smith, M. (2016). EZ-Wave: A Z-Wave hacking tool capable of breaking bulbs, abusing Z-Wave devices. Network World. Accessed 8 January 2017.
  25. 25.
    Vernon, P. (2016). The Mirai botnet: what it is, what it has done, and how to find out if you’re part of it. Accessed 2 January 2017.
  26. 26.
    Wheatley, S., Maillart, T., & Sornette, D. (2016). The extreme risk of personal data breaches and the erosion of privacy. The European Physical Journal B, 89, 1–2.CrossRefGoogle Scholar
  27. 27.
    Woolf, N. (2016). DDoS attack that disrupted internet was largest of its kind in history, experts say. The Guardian. Accessed 20 December 2016.

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.University of North GeorgiaDahlonegaUSA

Personalised recommendations