Internet of Things (IoT)
The Internet of Things has unlimited possibilities for home and business use. Appliances from refrigerators to sensor networks are now available in models that interact with a wireless network, making them easier to control with a computer or smartphone. Estimates suggest that there will be more than 75 billion IoT devices in use by 2025, according to IHS Markit.
Along with this massive market adoption of IoT, though, comes a trove of security concerns that necessitate attention and action. The National Institute of Standards and Technology's (NIST) National Cybersecurity Center of Excellence (NCCoE) is striving to make IoT more secure.
Security Guidance
-
Trusted IoT Device Network-Layer Onboarding and Lifecycle Management
Demonstrates approaches for securely onboarding IoT devices with network credentialsPreparing Draft -
Securing Distributed Energy Resources
An approach for securing data exchanges between and among distributed energy resource systems and electric power distribution facilitiesFinalized Practice Guide -
Securing Telehealth Remote Patient Monitoring Ecosystem
Ensuring that the infrastructure supporting remote patient monitoring capabilities can maintain the confidentiality of patient dataFinalized Practice Guide -
IoT Device Characterization
Demonstrates how to use device characterization techniques to describe the communication requirements of IoT devicesReviewing Comments -
Securing Home IoT Devices Using MUD
Demonstrates using the Manufacturer Usage Description (MUD) standard to improve the security of home IoT devicesFinalized Practice Guide -
Securing Wireless Infusion Pumps
Helping healthcare delivery organizations secure wireless infusion pumps (WIP) on an enterprise networkFinalized Practice Guide
The NCCoE’s IoT work is done in conjunction with and informed by NIST’s Cybersecurity for the Internet of Things Program. This program supports the development and application of standards, guidelines, and related tools to improve the cybersecurity of connected devices and the environments in which they are deployed.