File(s) under permanent embargo

Towards IoT security automation and orchestration

conference contribution
posted on 01.01.2020, 00:00 authored by Yifeng Zheng, Arindam Pal, Sharif Abuadbba, Shiva PokhrelShiva Pokhrel, Surya Nepal, Helge Janicke
The massive boom of Internet of Things (IoT) has led to the explosion of smart IoT devices and the emergence of various applications such as smart cities, smart grids, smart mining, connected health, and more. While the proliferation of IoT systems promises many benefits for different sectors, it also exposes a large attack surface, raising an imperative need to put security in the first place. It is impractical to heavily rely on manual operations to deal with security of massive IoT devices and applications. Hence, there is a strong need for securing IoT systems with minimum human intervention. In light of this situation, in this paper, we envision security automation and orchestration for IoT systems. After conducting a comprehensive evaluation of the literature and having conversations with industry partners, we envision a framework integrating key elements towards this goal. For each element, we investigate the existing landscapes, discuss the current challenges, and identify future directions. We hope that this paper will bring the attention of the academic and industrial community towards solving challenges related to security automation and orchestration for IoT systems.



TPS-ISA Trust, Privacy and Security in Intelligent Systems and Applicaitons. IEEE International Conference (2nd : 2020 : Virtual)


55 - 63


IEEE Computer Society


Atlanta, Georgia (Virtual)

Place of publication

Los Alamitos, Calif.

Start date


End date







10.1109/TPS-ISA50397.2020.00018 DOI Error Not Found Use non-DOI to access article

Publication classification

E1 Full written paper - refereed

Copyright notice

2020, Institute of Electrical and Electronics Engineers

Title of proceedings

TPS-ISA 2020 : Proceedings of IEEE's 2nd International Conference on Trust, Privacy and Security in Intelligent Systems and Applications

Usage metrics

Read the peer-reviewed publication