Research PaperVisit our research →
IoT Security Architecture and Policy for the Home - a Hub Based Approach

Abstract
One of a series of architecture and policy proposal documents, this paper provides a hub based approach to home IoT security. Based on well-known security principles and best practices, the example architecture focuses on three areas of security: network management, connecting devices and lifecycle management.
Authors:
This document is not aimed at consumers. However, it is aimed at a wide audience including CxOs and IoT purchasers, IT departments, developers and OEM product management, the IoT Security Foundation security architecture series intends to:
Reduce/manage complexity of IoT systems by simplifying implementation options
Demonstrate what a good security regime looks like, by example
Explain the benefits of a hub-based approach including achieving security goals, maintaining system hygiene and resilience, managing extensions and life-cycle provisioning
This architecture focuses on IoT devices and solutions implemented and managed in the home. The document first explores what a ‘hub architecture’ is in a home environment, and how this supports the key security principles promoted by the IoT Security Foundation. The paper also includes sections on:
Security principles and threat assessment
Hub-based reference architecture
Network management and security
Connecting devices securely
Lifecycle management
Access Publication
Publication Document
IoT-Security-Architecture-and-Policy-for-the-Home-a-Hub-Based-Approach.pdf
Research Details

- Publisher
- IoTSF
- Published
- November 15, 2018
- Last Updated
- August 5, 2022
- Pages
- 40
- Author
- Stacie Hoffmann