home.aspx
 
. https://theinternetofthings.report/Resources/Whitepapers/75a9ce35-7b89-41f2-80cf-731b3c55b8d0_Security_IoT_White_Paper_web (1).pdf
whitepaper
SHARESHARESHARE
SECURITY AND THE INTERNET OF THINGS
There are various ways to determine identity based on individual user and/or location. Each of these methods has its own characteristics and can be applied to devices on the IoT in much the same way that they are applied to live participants on the Internet. One is the familiar user name and password. This is a simple approach, but identifying information can be hacked or otherwise compromised. Access can be controlled based on MAC address, but MAC addresses can be spoofed, making an operating system believe that a device accessing the network has a different MAC address than its actual hard-coded one, allowing it to mask its identity and bypass access control lists. Another approach is to use device certificates, which cannot be spoofed. This approach is particularly useful on mobile devices that will access the network. DOWNLOAD